Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-9518 (GCVE-0-2019-9518)
Vulnerability from cvelistv5
Published
2019-08-13 20:50
Modified
2024-08-04 21:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K46011592" }, { "name": "[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E" }, { "name": "[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Piotr Sikora of Google for reporting this vulnerability." } ], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-26T16:06:12", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "VU#605641", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K46011592" }, { "name": "[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "FEDORA-2019-5a6a7bc12c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "openSUSE-SU-2019:2114", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2925", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "name": "RHSA-2019:3892", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "name": "RHSA-2019:4352", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0727", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E" }, { "name": "[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E" } ], "source": { "discovery": "UNKNOWN" }, "title": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "HTTP/2 Empty Frame Flooding", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9518", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Piotr Sikora of Google for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K46011592", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K46011592" }, { "name": "[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4520", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc@%3Ccommits.cassandra.apache.org%3E" }, { "name": "[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75@%3Ccommits.cassandra.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2019-9518", "datePublished": "2019-08-13T20:50:59", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-9518\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2019-08-13T21:15:13.003\",\"lastModified\":\"2025-01-14T19:29:55.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.\"},{\"lang\":\"es\",\"value\":\"Algunas implementaciones de HTTP / 2 son vulnerables a una avalancha de tramas vac\u00edas, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante env\u00eda una secuencia de tramas con una carga \u00fatil vac\u00eda y sin el indicador de fin de secuencia. Estos marcos pueden ser DATA, HEADERS, CONTINUATION y / o PUSH_PROMISE. El par pasa tiempo procesando cada cuadro desproporcionado para atacar el ancho de banda. Esto puede consumir un exceso de CPU.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cret@cert.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndIncluding\":\"1.4.0\",\"matchCriteriaId\":\"93988E60-006B-434D-AB16-1FA1D2FEBC2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.12\",\"matchCriteriaId\":\"1D294D56-E784-4DA8-9C2C-BC5A05C92C0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.04\",\"matchCriteriaId\":\"65B1D2F6-BC1F-47AF-B4E6-4B50986AC622\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.2.3\",\"matchCriteriaId\":\"603BF43B-FC99-4039-A3C0-467F015A32FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndIncluding\":\"7.1.6\",\"matchCriteriaId\":\"07BB02CE-D4F2-459C-B0C6-FF78BF7996AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.3\",\"matchCriteriaId\":\"D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C997777-BE79-4F77-90D7-E1A71D474D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9685B12-824F-42AD-B87C-6E7A78BB7FA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0C5120-B961-440F-B454-584BC54B549C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCBDFF9-AF42-4681-879B-CF789EBAD130\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D100F7CE-FC64-4CC6-852A-6136D72DA419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0952BA1A-5DF9-400F-B01F-C3A398A8A2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B157A2D-3422-4224-82D9-15AB3B989075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732F14CE-7994-4DD2-A28B-AE9E79826C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1987BDA-0113-4603-B9BE-76647EB043F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"C120C2F1-D50D-49CC-8E96-207ACCA49674\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.7.2.0\",\"versionEndExcluding\":\"7.7.2.24\",\"matchCriteriaId\":\"765E9856-2748-4A8B-91F5-A4DB3C8C547A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.8.2.0\",\"versionEndExcluding\":\"7.8.2.13\",\"matchCriteriaId\":\"EE6E66B1-3291-4E8E-93D6-30E9FDCF983E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.1.0\",\"versionEndExcluding\":\"8.2.0\",\"matchCriteriaId\":\"227104AD-396D-4ADD-87C7-C4CD5583DA04\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.8.1\",\"matchCriteriaId\":\"74FB695D-2C76-47AB-988E-5629D2E695E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"8.9.0\",\"versionEndExcluding\":\"8.16.1\",\"matchCriteriaId\":\"CFC0252A-DF1D-4CF4-B450-27267227B599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.12.0\",\"matchCriteriaId\":\"25A3180B-21AF-4010-9DAB-41ADFD2D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"10.13.0\",\"versionEndExcluding\":\"10.16.3\",\"matchCriteriaId\":\"2EC65858-FF7B-4171-82EA-80942D426F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.8.1\",\"matchCriteriaId\":\"F522C500-AA33-4029-865F-F27FB00A354E\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Aug/16\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3892\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4352\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0727\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/24\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/18\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K46011592\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4520\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Aug/16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2955\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0727\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.cert.org/vuls/id/605641/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2019/Aug/24\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/18\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190823-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K46011592\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2019/dsa-4520\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/security/advisory/Synology_SA_19_33\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2019:4352
Vulnerability from csaf_redhat
Published
2019-12-19 17:37
Modified
2025-08-07 10:52
Summary
Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update
Notes
Topic
An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.
This patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.
Security fix(es):
* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Fuse 6.3 and Red Hat JBoss A-MQ 6.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Fuse provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat A-MQ is a standards compliant messaging system that is tailored for use in mission critical applications.\n\nThis patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3. It includes bug fixes, which are documented in the patch notes accompanying the package on the download page. See the download link given in the references section below.\n\nSecurity fix(es):\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515) \n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (CVE-2019-10173)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:4352", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq.broker\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html/release_notes/index" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_4352.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R14 security and bug fix update", "tracking": { "current_release_date": "2025-08-07T10:52:27+00:00", "generator": { "date": "2025-08-07T10:52:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:4352", "initial_release_date": "2019-12-19T17:37:50+00:00", "revision_history": [ { "date": "2019-12-19T17:37:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-12-19T17:37:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T10:52:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 6.3", "product": { "name": "Red Hat Fuse 6.3", "product_id": "Red Hat Fuse 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 6.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-12-19T17:37:50+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are located in the download section of the customer portal.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Fuse 6.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 6.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 6.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" } ] }
rhsa-2020:1445
Vulnerability from csaf_redhat
Published
2020-04-14 13:04
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update
Notes
Topic
Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.
This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)
* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)
* jetty: error path information disclosure (CVE-2019-10247)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.4.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:1445", "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.4.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_1445.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.4.3 release and security update", "tracking": { "current_release_date": "2025-08-07T09:56:53+00:00", "generator": { "date": "2025-08-07T09:56:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:1445", "initial_release_date": "2020-04-14T13:04:37+00:00", "revision_history": [ { "date": "2020-04-14T13:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-14T13:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ 7.4.3", "product": { "name": "Red Hat AMQ 7.4.3", "product_id": "Red Hat AMQ 7.4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ 7.4.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-04-14T13:04:37+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ 7.4.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:1445" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ 7.4.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ 7.4.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2019:2925
Vulnerability from csaf_redhat
Published
2019-09-30 15:15
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: nodejs:10 security update
Notes
Topic
An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:10 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2925", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2925.json" } ], "title": "Red Hat Security Advisory: nodejs:10 security update", "tracking": { "current_release_date": "2025-08-07T09:56:06+00:00", "generator": { "date": "2025-08-07T09:56:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2925", "initial_release_date": "2019-09-30T15:15:54+00:00", "revision_history": [ { "date": "2019-09-30T15:15:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-30T15:15:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs:10:8000020190911085529:f8e95b4e", "product": { "name": "nodejs:10:8000020190911085529:f8e95b4e", "product_id": "nodejs:10:8000020190911085529:f8e95b4e", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10?rpmmod=nodejs:10:8000020190911085529:f8e95b4e" } } }, { "category": "product_version", "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_id": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=noarch" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_id": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@1.18.3-1.module%2Bel8%2B2632%2B6c5111ed?arch=src" } } }, { "category": "product_version", "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_id": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@17-3.module%2Bel8%2B2873%2Baa7dfd9a?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@10.16.3-2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_id": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@6.9.0-1.10.16.3.2.module%2Bel8.0.0%2B4214%2B49953fda?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, "product_reference": "nodejs:10:8000020190911085529:f8e95b4e", "relates_to_product_reference": "AppStream-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch" }, "product_reference": "nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src" }, "product_reference": "nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src" }, "product_reference": "nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" }, { "category": "default_component_of", "full_product_name": { "name": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64 as a component of nodejs:10:8000020190911085529:f8e95b4e as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" }, "product_reference": "npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64", "relates_to_product_reference": "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-09-30T15:15:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2925" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-debugsource-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-devel-debuginfo-1:10.16.3-2.module+el8.0.0+4214+49953fda.x86_64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-docs-1:10.16.3-2.module+el8.0.0+4214+49953fda.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-nodemon-0:1.18.3-1.module+el8+2632+6c5111ed.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.noarch", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:nodejs-packaging-0:17-3.module+el8+2873+aa7dfd9a.src", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.aarch64", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.ppc64le", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.s390x", "AppStream-8.0.0.Z:nodejs:10:8000020190911085529:f8e95b4e:npm-1:6.9.0-1.10.16.3.2.module+el8.0.0+4214+49953fda.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2020:0922
Vulnerability from csaf_redhat
Published
2020-03-23 08:21
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update
Notes
Topic
Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.
This release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)
* jetty: error path information disclosure (CVE-2019-10247)
* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat AMQ Broker 7.6 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. \n\nThis release of Red Hat AMQ Broker 7.6.0 serves as a replacement for Red Hat AMQ Broker 7.5.0, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)\n\n* jetty: error path information disclosure (CVE-2019-10247)\n\n* mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0922", "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.6.0\u0026productChanged=yes" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/7.6/" }, { "category": "external", "summary": "1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0922.json" } ], "title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.6 release and security update", "tracking": { "current_release_date": "2025-08-07T09:56:35+00:00", "generator": { "date": "2025-08-07T09:56:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0922", "initial_release_date": "2020-03-23T08:21:33+00:00", "revision_history": [ { "date": "2020-03-23T08:21:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-23T08:21:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat AMQ", "product": { "name": "Red Hat AMQ", "product_id": "Red Hat AMQ", "product_identification_helper": { "cpe": "cpe:/a:redhat:amq_broker:7" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0222", "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1696012" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ 5.0.0 - 5.15.8, unmarshalling corrupt MQTT frame can lead to broker Out of Memory exception making it unresponsive.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: Corrupt MQTT frame can cause broker shutdown", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0222" }, { "category": "external", "summary": "RHBZ#1696012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696012" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0222" } ], "release_date": "2019-03-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: Corrupt MQTT frame can cause broker shutdown" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat AMQ" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-23T08:21:33+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat AMQ" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0922" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat AMQ" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat AMQ" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" } ] }
rhsa-2020:3196
Vulnerability from csaf_redhat
Published
2020-07-29 06:06
Modified
2025-08-07 12:26
Summary
Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update
Notes
Topic
An update is now available for Red Hat Decision Manager.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model & Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business.
This release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)
* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)
* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)
* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)
* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)
* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)
* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)
* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)
* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)
* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)
* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)
* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)
* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)
* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)
* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)
* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)
* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)
* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)
* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)
* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)
* netty: compression/decompression codecs don't enforce limits on buffer allocation sizes (CVE-2020-11612)
* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)
* keycloak: security issue on reset credential flow (CVE-2020-1718)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Decision Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Decision Manager is an open source decision management platform that combines business rules management, complex event processing, Decision Model \u0026 Notation (DMN) execution, and Business Optimizer for solving planning problems. It automates business decisions and makes that logic available to the entire business. \n\nThis release of Red Hat Decision Manager 7.8.0 serves as an update to Red Hat Decision Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3196", "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhdm\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.8/html/release_notes_for_red_hat_decision_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3196.json" } ], "title": "Red Hat Security Advisory: Red Hat Decision Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-08-07T12:26:00+00:00", "generator": { "date": "2025-08-07T12:26:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3196", "initial_release_date": "2020-07-29T06:06:57+00:00", "revision_history": [ { "date": "2020-07-29T06:06:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:06:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T12:26:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Decision Manager 7", "product": { "name": "Red Hat Decision Manager 7", "product_id": "Red Hat Decision Manager 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Decision Manager 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:06:57+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Decision Manager 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3196" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Decision Manager 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Decision Manager 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2020:0983
Vulnerability from csaf_redhat
Published
2020-03-26 15:46
Modified
2025-08-07 12:28
Summary
Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update
Notes
Topic
A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]
Details
This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)
* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)
* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)
* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)
* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)
* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)
* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)
* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)
* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)
* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)
* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)
* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)
* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)
* springframework: DoS Attack via Range Requests (CVE-2018-15756)
* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)
* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.5 to 7.6) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added; also added golang CVE descriptions that were unintentionally ommitted from the original publication]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)\n\n* jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)\n\n* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)\n\n* logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)\n\n* js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)\n\n* apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)\n\n* spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)\n\n* jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)\n\n* jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)\n\n* springframework: DoS Attack via Range Requests (CVE-2018-15756)\n\n* c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0983", "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "external", "summary": "1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.6.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/" }, { "category": "external", "summary": "1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0983.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.6.0 security update", "tracking": { "current_release_date": "2025-08-07T12:28:44+00:00", "generator": { "date": "2025-08-07T12:28:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0983", "initial_release_date": "2020-03-26T15:46:59+00:00", "revision_history": [ { "date": "2020-03-26T15:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:19:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T12:28:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.6.0", "product": { "name": "Red Hat Fuse 7.6.0", "product_id": "Red Hat Fuse 7.6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9251", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2016-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1399546" } ], "notes": [ { "category": "description", "text": "jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery: Cross-site scripting via cross-domain ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-9251" }, { "category": "external", "summary": "RHBZ#1399546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399546" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-9251", "url": "https://www.cve.org/CVERecord?id=CVE-2015-9251" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9251" } ], "release_date": "2015-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery: Cross-site scripting via cross-domain ajax requests" }, { "cve": "CVE-2017-5929", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1432858" } ], "notes": [ { "category": "description", "text": "It was found that logback is vulnerable to a deserialization issue. Logback can be configured to allow remote logging through SocketServer/ServerSocketReceiver interfaces that can accept untrusted serialized data. Authenticated attackers on the adjacent network can leverage this vulnerability to execute arbitrary code through deserialization of custom gadget chains.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5929" }, { "category": "external", "summary": "RHBZ#1432858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5929", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5929" } ], "release_date": "2017-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: Serialization vulnerability in SocketServer and ServerSocketReceiver" }, { "cve": "CVE-2017-16012", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1591854" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] This CVE has been rejected. This candidate is a duplicate of CVE-2015-9251. Note: All CVE users should reference CVE-2015-9251 instead of this candidate.", "title": "Vulnerability description" }, { "category": "summary", "text": "js-jquery: XSS in responses from cross-origin ajax requests", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16012" }, { "category": "external", "summary": "RHBZ#1591854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591854" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16012" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16012" } ], "release_date": "2017-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "js-jquery: XSS in responses from cross-origin ajax requests" }, { "cve": "CVE-2018-11771", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618573" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17\u0027s ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress\u0027 zip package.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11771" }, { "category": "external", "summary": "RHBZ#1618573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11771", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11771" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E", "url": "https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E" } ], "release_date": "2018-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip" }, { "cve": "CVE-2018-12536", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2018-06-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597418" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: full server path revealed when using the default Error Handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12536" }, { "category": "external", "summary": "RHBZ#1597418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12536", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12536" } ], "release_date": "2018-06-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Information disclosure occurs when java.nio.file.InvalidPathException occurs and is handled by the default Jetty error handler. To protect against this, a custom error handler can be configured for that particular error or for a larger set of errors according to the documentation link below. Red Hat Product Security advises that production deployments on Jetty use custom error handlers to limit the information disclosed and to ensure effective logging of error conditions.\n\nhttp://www.eclipse.org/jetty/documentation/current/custom-error-pages.html", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: full server path revealed when using the default Error Handling" }, { "cve": "CVE-2018-15756", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1643043" } ], "notes": [ { "category": "description", "text": "Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, versions 4.3.x prior to 4.3.20, and older unsupported versions on the 4.2.x branch provide support for range requests when serving static resources through the ResourceHttpRequestHandler, or starting in 5.0 when an annotated controller returns an org.springframework.core.io.Resource. A malicious user (or attacker) can add a range header with a high number of ranges, or with wide ranges that overlap, or both, for a denial of service attack. This vulnerability affects applications that depend on either spring-webmvc or spring-webflux. Such applications must also have a registration for serving static resources (e.g. JS, CSS, images, and others), or have an annotated controller that returns an org.springframework.core.io.Resource. Spring Boot applications that depend on spring-boot-starter-web or spring-boot-starter-webflux are ready to serve static resources out of the box and are therefore vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS Attack via Range Requests", "title": "Vulnerability summary" }, { "category": "other", "text": "The package rhvm-dependencies does not include the vulnerable spring-webmvc component.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-15756" }, { "category": "external", "summary": "RHBZ#1643043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-15756", "url": "https://www.cve.org/CVERecord?id=CVE-2018-15756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15756" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2018-15756", "url": "https://pivotal.io/security/cve-2018-15756" } ], "release_date": "2018-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: DoS Attack via Range Requests" }, { "cve": "CVE-2019-3802", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1730316" } ], "notes": [ { "category": "description", "text": "This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3802" }, { "category": "external", "summary": "RHBZ#1730316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730316" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3802", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3802" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-3802", "url": "https://pivotal.io/security/cve-2019-3802" } ], "release_date": "2019-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "cve": "CVE-2019-5427", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2019-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709860" } ], "notes": [ { "category": "description", "text": "c3p0 version \u003c 0.9.5.4 may be exploited by a billion laughs attack when loading XML configuration due to missing protections against recursive entity expansion when loading configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "c3p0: loading XML configuration leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not vulnerable to this issue, because the candlepin component who uses the c3p0 jar never passes a XML configuration file to c3p0, even though it includes a vulnerable version of the latter. Since this issue requires a XML files to be loaded by c3p0, an exploitation path doesn\u0027t exist.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5427" }, { "category": "external", "summary": "RHBZ#1709860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5427", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5427" } ], "release_date": "2019-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "c3p0: loading XML configuration leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10241", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705924" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and older, the server is vulnerable to XSS conditions if a remote client USES a specially formatted URL against the DefaultServlet or ResourceHandler that is configured for showing a Listing of directory contents.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10241" }, { "category": "external", "summary": "RHBZ#1705924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705924" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10241", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10241" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10241" } ], "release_date": "2019-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions" }, { "cve": "CVE-2019-10247", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705993" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: error path information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jetty which is embedded in the nutch package as shipped with Red Hat Satellite 5. The jetty server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low in the context of Red Hat Satellite 5. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10247" }, { "category": "external", "summary": "RHBZ#1705993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10247", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10247" } ], "release_date": "2019-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: error path information disclosure" }, { "cve": "CVE-2019-11272", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1728993" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of \"null.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11272" }, { "category": "external", "summary": "RHBZ#1728993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11272", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11272" }, { "category": "external", "summary": "https://pivotal.io/security/cve-2019-11272", "url": "https://pivotal.io/security/cve-2019-11272" } ], "release_date": "2019-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security-core: mishandling of user passwords allows logging in with a password of NULL" }, { "cve": "CVE-2019-12384", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-06-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725807" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind in versions prior to 2.9.9. The vulnerability would permit polymorphic deserialization of malicious objects using the logback-core gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. Depending on the classpath content, remote code execution may be possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack\u0027s OpenDaylight does not use logback in any supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nThis vulnerability relies on logback-core (ch.qos.logback.core) being present in the application\u0027s ClassPath. Logback-core is not packaged as an RPM for Red Hat Enterprise Linux or Red Hat Software Collections. Applications using jackson-databind that do not also use logback-core are not impacted by this vulnerability.\n\nThis issue affects the versions of jackson-databind bundled with candlepin as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12384" }, { "category": "external", "summary": "RHBZ#1725807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725807" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12384", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12384" } ], "release_date": "2019-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution" }, { "cve": "CVE-2019-12422", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1774726" } ], "notes": [ { "category": "description", "text": "Apache Shiro before 1.4.2, when using the default \"remember me\" configuration, cookies could be susceptible to a padding attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "shiro: Cookie padding oracle vulnerability with default configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12422" }, { "category": "external", "summary": "RHBZ#1774726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1774726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12422" } ], "release_date": "2019-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "shiro: Cookie padding oracle vulnerability with default configuration" }, { "cve": "CVE-2019-12814", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-06-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1725795" } ], "notes": [ { "category": "description", "text": "A new polymorphic typing flaw was discovered in FasterXML jackson-databind, versions 2.x through 2.9.9. With default typing enabled, an attacker can send a specifically crafted JSON message to the server that allows them to read arbitrary local files.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Satellite 6 does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability. \n* Red Hat OpenStack\u0027s OpenDaylight does not include the jdom or jdom2 packages, thus it is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12814" }, { "category": "external", "summary": "RHBZ#1725795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725795" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12814" } ], "release_date": "2019-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "This vulnerability relies on jdom (org.jdom) or jdom2 (org.jdom2) being present in the application\u0027s ClassPath. Applications using jackson-databind that do not also use jdom or jdom2 are not impacted by this vulnerability.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message." }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" }, { "cve": "CVE-2019-14439", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1752962" } ], "notes": [ { "category": "description", "text": "A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Polymorphic typing issue related to logback/JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenDaylight provided as part of Red Hat OpenStack does not utilize logback when used in a supported configuration. Therefore, the prerequisites for this vulnerability are not present and OpenDaylight is not affected.\n\nSatellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14439" }, { "category": "external", "summary": "RHBZ#1752962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14439", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14439" } ], "release_date": "2019-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Polymorphic typing issue related to logback/JNDI" }, { "acknowledgments": [ { "names": [ "Guillaume Teissier" ], "organization": "Orange" } ], "cve": "CVE-2019-17570", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1775193" } ], "notes": [ { "category": "description", "text": "A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC, performed deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious or compromised XMLRPC server could possibly use this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.", "title": "Vulnerability description" }, { "category": "summary", "text": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7 provides vulnerable version of xmlrpc via the Optional repository. As the Optional repository is not supported, this issue is not planned to be addressed there.\n\nRed Hat Virtualization Manager uses xmlrpc only for internal communication with the scheduler. Since this is a component of the Manager itself, it is not subject to attacker influence and does not represent an attack surface.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17570" }, { "category": "external", "summary": "RHBZ#1775193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1775193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17570", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17570" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17570" }, { "category": "external", "summary": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp", "url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x2r6-4m45-m4jp" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-26T15:46:59+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.6.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/", "product_ids": [ "Red Hat Fuse 7.6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0983" }, { "category": "workaround", "details": "There is no known mitigation other than restricting applications using the Apache XMLRPC client library from sending requests to untrusted XMLRPC servers.", "product_ids": [ "Red Hat Fuse 7.6.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.6.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response" } ] }
rhsa-2019:3892
Vulnerability from csaf_redhat
Published
2019-11-14 21:17
Modified
2025-08-07 10:52
Summary
Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update
Notes
Topic
A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]
Details
This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)
* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)
* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)
* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)
* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)
* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)
* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)
* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)
* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)
* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)
* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)
* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)
* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)
* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)
* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)
* mesos: docker image code execution (CVE-2019-0204)
* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)
* syndesis: default CORS configuration is allow all (CVE-2019-14860)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)
* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)
* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.4 to 7.5) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[2020-04-17 update: descriptions for mutiple components fixed for the same CVE added]", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.5.0 serves as a replacement for Red Hat Fuse 7.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525) (CVE-2017-15095)\n\n* jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485)\n\n* infinispan: deserialization of data in XML and JSON transcoders (CVE-2018-1131)\n\n* hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-8009)\n\n* jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis (CVE-2018-11307)\n\n* jackson-databind: improper polymorphic deserialization of types from Jodd-db library (CVE-2018-12022)\n\n* jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver (CVE-2018-12023)\n\n* jackson-databind: arbitrary code execution in slf4j-ext class (CVE-2018-14718)\n\n* jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes (CVE-2018-14719)\n\n* jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)\n\n* jackson-databind: improper polymorphic deserialization in axis2-transport-jms class (CVE-2018-19360)\n\n* jackson-databind: improper polymorphic deserialization in openjpa class (CVE-2018-19361)\n\n* jackson-databind: improper polymorphic deserialization in jboss-common-core class (CVE-2018-19362)\n\n* retrofit: Directory traversal in RequestBuilder allows manipulation of resources (CVE-2018-1000850)\n\n* zookeeper: Information disclosure in Apache ZooKeeper (CVE-2019-0201)\n\n* mesos: docker image code execution (CVE-2019-0204)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* grpc: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* grpc: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* grpc: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* syndesis: default CORS configuration is allow all (CVE-2019-14860)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* activemq: ActiveMQ Client Missing TLS Hostname Verification (CVE-2018-11775)\n\n* tika: Incomplete fix allows for XML entity expansion resulting in denial of service (CVE-2018-11796)\n\n* jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class (CVE-2018-14721)\n\n* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3892", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.5.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/" }, { "category": "external", "summary": "1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3892.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.5.0 security update", "tracking": { "current_release_date": "2025-08-07T10:52:20+00:00", "generator": { "date": "2025-08-07T10:52:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:3892", "initial_release_date": "2019-11-14T21:17:38+00:00", "revision_history": [ { "date": "2019-11-14T21:17:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-04-20T07:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T10:52:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.5.0", "product": { "name": "Red Hat Fuse 7.5.0", "product_id": "Red Hat Fuse 7.5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Liao Xinxi" ], "organization": "NSFOCUS" } ], "cve": "CVE-2017-15095", "cwe": { "id": "CWE-184", "name": "Incomplete List of Disallowed Inputs" }, "discovery_date": "2017-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1506612" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of jackson-databind (in Satellite 6.0 and 6.1) and candlepin (which embeds a copy of jackson-databind in Satellite 6.2) as shipped with Red Hat Satellite 6.x. However the affected code is NOT used at this time:\n\nCandlepin currently uses the default type resolution configuration for the ObjectMappers it creates/uses. Nowhere in candlepin do we enable global polymorphic deserialization via enableDefaultTyping(...), therefore based on the documentation sited BZ 1462702 , candlepin should not be affected.\n\nHowever as the vulnerable software ships with the product we have marked them as vulnerable to ensure the issue is tracked.\n\nJBoss EAP 7.x only uses the vulnerable Jackson Databind library for marshalling and unmarshalling of JSON objects passed to JAX-RS webservices. Some advise about how to remain safe when using JAX-RS webservices on JBoss EAP 7.x is available here: \n\nhttps://access.redhat.com/solutions/3279231", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15095" }, { "category": "external", "summary": "RHBZ#1506612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1506612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15095", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15095" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Mitigation to this problem is to not trigger polymorphic desrialization globally by using: objectMapper.enableDefaultTyping() and rather use @JsonTypeInfo on the class property to explicitly define the type information. For more information on this issue please refer to https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-7525)" }, { "acknowledgments": [ { "names": [ "0c0c0f from 360\u89c2\u661f\u5b9e\u9a8c\u5ba4" ] } ], "cve": "CVE-2017-17485", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-12-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1528565" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in the jackson-databind which could allow an unauthenticated user to perform code execution by sending maliciously crafted input to the readValue method of ObjectMapper. This issue extends upon the previous flaws CVE-2017-7525 and CVE-2017-15095 by blacklisting more classes that could be used maliciously.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17485" }, { "category": "external", "summary": "RHBZ#1528565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528565" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17485", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17485" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17485" }, { "category": "external", "summary": "https://access.redhat.com/solutions/3442891", "url": "https://access.redhat.com/solutions/3442891" } ], "release_date": "2017-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095)" }, { "cve": "CVE-2018-1131", "cwe": { "id": "CWE-349", "name": "Acceptance of Extraneous Untrusted Data With Trusted Data" }, "discovery_date": "2018-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576492" } ], "notes": [ { "category": "description", "text": "Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Versions 9.0.3.Final, 9.1.7.Final, 8.2.10.Final, 9.2.2.Final, 9.3.0.Alpha1 are believed to be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: deserialization of data in XML and JSON transcoders", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1131" }, { "category": "external", "summary": "RHBZ#1576492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1131", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1131" } ], "release_date": "2018-05-14T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: deserialization of data in XML and JSON transcoders" }, { "cve": "CVE-2018-8009", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-06-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1593018" } ], "notes": [ { "category": "description", "text": "Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of rhs-hadoop as shipped with Red Hat Gluster Storage 3. For JBoss Fuse 6.3 and 7 standalone, while they ship vulnerable artifact via camel-hbase, camel-hdfs2 (fuse 6.3) and camel-hdfs2 (fuse 7), there\u0027s no invocation on the flawed code that could lead to an unzip operation. So fuse 6.3, 7 standalone are not affected. However FIS 2.0 and Fuse 7 on OpenShift ship vulnerable artifact via maven BOM, so setting fuse as affected for this reason.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8009" }, { "category": "external", "summary": "RHBZ#1593018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8009" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8009" } ], "release_date": "2018-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hadoop: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file" }, { "cve": "CVE-2018-8034", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1607580" } ], "notes": [ { "category": "description", "text": "The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Host name verification missing in WebSocket client", "title": "Vulnerability summary" }, { "category": "other", "text": "Tomcat 6, and Red Hat products shipping it, are not affected by this CVE. Tomcat 7, 8, and 9, as well as Red Hat Products shipping them, are affected. Affected products, including Red Hat JBoss Web Server 3 and 5, Enterprise Application Server 6, and Fuse 7, may provide fixes for this issue in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8034" }, { "category": "external", "summary": "RHBZ#1607580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607580" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8034" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8034" } ], "release_date": "2018-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Host name verification missing in WebSocket client" }, { "cve": "CVE-2018-11307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677341" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using MyBatis classes when using DefaultTyping. An attacker could use this flaw to achieve content exfiltration and possibly conduct further attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load MyBatis classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include MyBatis classes.\n\nRed Hat Fuse 6 and 7 are not directly affected by this issue, as although they do ship the vulnerable jackson-databind component, they do not enable polymorphic deserialization or default typing which are required for exploitability. Their impacts have correspondingly been reduced to Moderate. Future updates may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11307" }, { "category": "external", "summary": "RHBZ#1677341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677341" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11307", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11307" } ], "release_date": "2018-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis" }, { "cve": "CVE-2018-11775", "discovery_date": "2018-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1629083" } ], "notes": [ { "category": "description", "text": "TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "activemq: ActiveMQ Client Missing TLS Hostname Verification", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11775" }, { "category": "external", "summary": "RHBZ#1629083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1629083" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11775", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11775" } ], "release_date": "2018-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "activemq: ActiveMQ Client Missing TLS Hostname Verification" }, { "cve": "CVE-2018-11796", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "discovery_date": "2018-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1639090" } ], "notes": [ { "category": "description", "text": "In Apache Tika 1.19 (CVE-2018-11761), we added an entity expansion limit for XML parsing. However, Tika reuses SAXParsers and calls reset() after each parse, which, for Xerces2 parsers, as per the documentation, removes the user-specified SecurityManager and thus removes entity expansion limits after the first parse. Apache Tika versions from 0.1 to 1.19 are therefore still vulnerable to entity expansions which can lead to a denial of service attack. Users should upgrade to 1.19.1 or later.", "title": "Vulnerability description" }, { "category": "summary", "text": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of tika which is embedded in the nutch package as shipped with Red Hat Satellite 5. The tika server is not exposed, as such exploitation is difficult, Red Hat Product Security has rated this issue as having security impact of Low. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11796" }, { "category": "external", "summary": "RHBZ#1639090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639090" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11796", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11796" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11796" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E", "url": "https://lists.apache.org/thread.html/88de8350cda9b184888ec294c813c5bd8a2081de8fd3666f8904bc05@%3Cdev.tika.apache.org%3E" } ], "release_date": "2018-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tika: Incomplete fix allows for XML entity expansion resulting in denial of service" }, { "cve": "CVE-2018-12022", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671097" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Jodd DB connection classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Jodd classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Jodd classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12022" }, { "category": "external", "summary": "RHBZ#1671097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12022", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12022" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12022" } ], "release_date": "2018-05-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Jodd-db library" }, { "cve": "CVE-2018-12023", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671096" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in jackson-databind where it would permit deserialization of a malicious object using Oracle JDBC classes when using DefaultTyping. An attacker could use this flaw to achieve remote code execution under certain circumstances.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since Candlepin\u0027s java runtime environment does not load Oracle\u0027s JDBC classes.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not load Oracle\u0027s JDBC classes.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12023" }, { "category": "external", "summary": "RHBZ#1671096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671096" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12023", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12023" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12023" } ], "release_date": "2018-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver" }, { "cve": "CVE-2018-14718", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666415" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using slf4j classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in slf4j-ext class", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in jackson-databind involves exploiting CVE-2018-1088 against slf4j, which was fixed in Red Hat products through the errata referenced at https://access.redhat.com/security/cve/cve-2018-8088. Applications that link only slf4j versions including that fix are not vulnerable to this vulnerability.\n\nRed Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle slf4j-ext jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14718" }, { "category": "external", "summary": "RHBZ#1666415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14718", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14718" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in slf4j-ext class" }, { "cve": "CVE-2018-14719", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666418" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using blaze classes. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes", "title": "Vulnerability summary" }, { "category": "other", "text": "The following Red Hat products are not affected by this issue as they do not bundle or provide the requisite gadget jars to exploit this vulnerability:\nRed Hat Satellite 6\nRed Hat Enterprise Virtualization 4\nRed Hat Fuse 6, 7, and Fuse Integration Services 2\nRed Hat A-MQ 6", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14719" }, { "category": "external", "summary": "RHBZ#1666418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14719", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14719" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: arbitrary code execution in blaze-ds-opt and blaze-ds-core classes" }, { "cve": "CVE-2018-14720", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666423" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: exfiltration/XXE in some JDK classes", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.\n\nRed Hat Enterprise Virtualization 4 is not affected by this issue, since its only supported Java runtime (openJDK) doesn\u0027t bundle the com.sun.deploy.security.ruleset.DRSHelper class.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14720" }, { "category": "external", "summary": "RHBZ#1666423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14720", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14720" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible \n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: exfiltration/XXE in some JDK classes" }, { "cve": "CVE-2018-14721", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666428" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle axis2-jaxws jar.\n\nRed Hat Virtualization is not affected by this issue, since its does not bundle axis2-jaxws jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14721" }, { "category": "external", "summary": "RHBZ#1666428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14721", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14721" } ], "release_date": "2018-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class" }, { "cve": "CVE-2018-19360", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666482" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the axis2-transport-jms class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t include axis2-transport-jms jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since it does not include axis2-transport-jms jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19360" }, { "category": "external", "summary": "RHBZ#1666482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19360" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19360" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in axis2-transport-jms class" }, { "cve": "CVE-2018-19361", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666484" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the OpenJPA class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in openjpa class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle openjpa jar.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19361" }, { "category": "external", "summary": "RHBZ#1666484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19361", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19361" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19361" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in openjpa class" }, { "cve": "CVE-2018-19362", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-01-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666489" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in jackson-databind, where it would permit polymorphic deserialization of a malicious object using the jboss-common-core class. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: improper polymorphic deserialization in jboss-common-core class", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.\n\nRed Hat Virtualization 4 is not affected by this issue, since its candlepin component doesn\u0027t bundle jboss-common-core jar.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19362" }, { "category": "external", "summary": "RHBZ#1666489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19362", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19362" } ], "release_date": "2018-11-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: improper polymorphic deserialization in jboss-common-core class" }, { "cve": "CVE-2018-1000850", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663904" } ], "notes": [ { "category": "description", "text": "A flaw was found in Retrofit, where it allowed directory traversal via its RequestBuilder class. An attacker could use this flaw to access information or commands outside of its set permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000850" }, { "category": "external", "summary": "RHBZ#1663904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000850", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000850" } ], "release_date": "2018-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "retrofit: Directory traversal in RequestBuilder allows manipulation of resources" }, { "cve": "CVE-2019-0201", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2019-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715197" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache ZooKeeper. A lack of permission checks while retrieving ACLs allows unsalted hash values to be disclosed for unauthenticated or unprivileged users.", "title": "Vulnerability description" }, { "category": "summary", "text": "zookeeper: Information disclosure in Apache ZooKeeper", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0201" }, { "category": "external", "summary": "RHBZ#1715197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0201", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0201" } ], "release_date": "2019-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "Use an authentication method other than Digest (e.g. Kerberos) or upgrade to zookeeper 3.4.14 or later (3.5.5 or later if on the 3.5 branch). [https://zookeeper.apache.org/security.html#CVE-2019-0201]", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "zookeeper: Information disclosure in Apache ZooKeeper" }, { "cve": "CVE-2019-0204", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2019-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1692755" } ], "notes": [ { "category": "description", "text": "A flaw was found in Docker image running under root user, where it is possible to overwrite the init helper binary of the container runtime or the command executor in Apache Mesos. A malicious user could use this flaw to gain root-level code execution on the host.", "title": "Vulnerability description" }, { "category": "summary", "text": "mesos: docker image code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-0204" }, { "category": "external", "summary": "RHBZ#1692755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1692755" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0204" } ], "release_date": "2019-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "mesos: docker image code execution" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "acknowledgments": [ { "names": [ "Jeremy Choi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-14860", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2019-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1761912" } ], "notes": [ { "category": "description", "text": "It was found that the Syndesis configuration for Cross-Origin Resource Sharing was set to allow all origins. An attacker could use this lack of protection to conduct phishing attacks and further access unauthorized information.", "title": "Vulnerability description" }, { "category": "summary", "text": "syndesis: default CORS configuration is allow all", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14860" }, { "category": "external", "summary": "RHBZ#1761912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1761912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14860", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14860" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14860" } ], "release_date": "2019-10-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "syndesis: default CORS configuration is allow all" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-14T21:17:38+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.5.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.5/", "product_ids": [ "Red Hat Fuse 7.5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Fuse 7.5.0" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Fuse 7.5.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" } ] }
rhsa-2020:0727
Vulnerability from csaf_redhat
Published
2020-03-05 12:53
Modified
2025-08-07 10:52
Summary
Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update
Notes
Topic
An update for Red Hat Data Grid is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.
This release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)
* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)
* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)
* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)
* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)
* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)
* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)
* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat Data Grid is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.\n\nThis release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.\n\nSecurity Fix(es):\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)\n\n* infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)\n\n* jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)\n\n* h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)\n\n* wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)\n\n* undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)\n\n* undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)\n\n* undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0727", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=patches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index" }, { "category": "external", "summary": "1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0727.json" } ], "title": "Red Hat Security Advisory: Red Hat Data Grid 7.3.3 security update", "tracking": { "current_release_date": "2025-08-07T10:52:43+00:00", "generator": { "date": "2025-08-07T10:52:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:0727", "initial_release_date": "2020-03-05T12:53:27+00:00", "revision_history": [ { "date": "2020-03-05T12:53:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-05T12:53:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T10:52:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Data Grid 7.3.3", "product": { "name": "Red Hat Data Grid 7.3.3", "product_id": "Red Hat Data Grid 7.3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-14335", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-07-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1610877" } ], "notes": [ { "category": "description", "text": "An issue was discovered in H2 1.4.197. Insecure handling of permissions in the backup function allows attackers to read sensitive files (outside of their permissions) via a symlink to a fake database file.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Information Exposure due to insecure handling of permissions in the backup", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14335" }, { "category": "external", "summary": "RHBZ#1610877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14335", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14335" } ], "release_date": "2018-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Information Exposure due to insecure handling of permissions in the backup" }, { "acknowledgments": [ { "names": [ "Daniel Le Gall" ], "organization": "SCRT Information Security" } ], "cve": "CVE-2019-3805", "cwe": { "id": "CWE-364", "name": "Signal Handler Race Condition" }, "discovery_date": "2018-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660263" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3805" }, { "category": "external", "summary": "RHBZ#1660263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3805" } ], "release_date": "2019-04-30T17:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: Race condition on PID file allows for termination of arbitrary processes by local users" }, { "acknowledgments": [ { "names": [ "Carter Kozak" ] } ], "cve": "CVE-2019-3888", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693777" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3888" }, { "category": "external", "summary": "RHBZ#1693777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693777" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3888" } ], "release_date": "2019-06-10T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10173", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2019-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1722971" } ], "notes": [ { "category": "description", "text": "It was found that xstream API version 1.4.10 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. This a regression of CVE-2013-7285 fixed in 1.4.7 (fixed) as of BPMS 6.0.1, the regression was introduced with xstream-1.4.10 implemented in RHPAM.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10173" }, { "category": "external", "summary": "RHBZ#1722971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10173", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10173" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10173" }, { "category": "external", "summary": "http://x-stream.github.io/changes.html#1.4.11", "url": "http://x-stream.github.io/changes.html#1.4.11" } ], "release_date": "2018-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)" }, { "cve": "CVE-2019-10174", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2018-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1703469" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan\u0027s privileges. The attacker can use reflection to introduce new, malicious behavior into the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight contains the vulnerable library. This library is a requirement of other dependencies (Karaf and Hibernate). Under supported deployments, the vulnerable functionality is not utilized. Based on this, no OpenDaylight versions will not be fixed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10174" }, { "category": "external", "summary": "RHBZ#1703469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10174", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10174" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10174" } ], "release_date": "2019-11-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "There is no known mitigation for this issue.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "Viada" } ], "cve": "CVE-2019-10184", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1713068" } ], "notes": [ { "category": "description", "text": "undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Information leak in requests for directories without trailing slashes", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10184" }, { "category": "external", "summary": "RHBZ#1713068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713068" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10184", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10184" } ], "release_date": "2019-07-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "undertow: Information leak in requests for directories without trailing slashes" }, { "cve": "CVE-2019-10212", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1731984" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u2019s credentials from the log files.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files", "title": "Vulnerability summary" }, { "category": "other", "text": "All the Red Hat products using the undertow-core jar version 2.0.20 or before are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10212" }, { "category": "external", "summary": "RHBZ#1731984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10212", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10212" } ], "release_date": "2019-09-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "Use Elytron instead of legacy Security subsystem.", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files" }, { "cve": "CVE-2019-14379", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-07-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1737517" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in FasterXML jackson-databind, where it would permit polymorphic deserialization of malicious objects using the ehcache and logback JNDI gadgets when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: default typing mishandling leading to remote code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nSimilarly, Satellite 6 does not enable polymorphic unmarshmalling, which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Data Grid 7.3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14379" }, { "category": "external", "summary": "RHBZ#1737517", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737517" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14379", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14379" } ], "release_date": "2019-07-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-05T12:53:27+00:00", "details": "To install this update, do the following:\n\n1. Download the Data Grid 7.3.3 server patch from the customer portal.\n2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.\n3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.\n4. Restart Data Grid to ensure the changes take effect.", "product_ids": [ "Red Hat Data Grid 7.3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Data Grid 7.3.3" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat Data Grid 7.3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jackson-databind: default typing mishandling leading to remote code execution" } ] }
rhsa-2019:2939
Vulnerability from csaf_redhat
Published
2019-10-01 10:03
Modified
2025-08-07 09:55
Summary
Red Hat Security Advisory: rh-nodejs10-nodejs security update
Notes
Topic
An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs10-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.16.3).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2939.json" } ], "title": "Red Hat Security Advisory: rh-nodejs10-nodejs security update", "tracking": { "current_release_date": "2025-08-07T09:55:59+00:00", "generator": { "date": "2025-08-07T09:55:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2939", "initial_release_date": "2019-10-01T10:03:49+00:00", "revision_history": [ { "date": "2019-10-01T10:03:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-01T10:03:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:55:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.src", "product": { "name": "rh-nodejs10-0:3.2-3.el7.src", "product_id": "rh-nodejs10-0:3.2-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_id": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-docs@10.16.3-3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-devel@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_id": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-npm@6.9.0-10.16.3.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_id": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-nodejs-debuginfo@10.16.3-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-runtime@3.2-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_id": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs10-scldevel@3.2-3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64" }, "product_reference": "rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch" }, "product_reference": "rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64" }, "product_reference": "rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" }, "product_reference": "rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12121", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661002" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Denial of Service with large HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "RHBZ#1661002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661002" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12121", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12121" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Denial of Service with large HTTP headers" }, { "cve": "CVE-2018-12122", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661005" } ], "notes": [ { "category": "description", "text": "It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Slowloris HTTP Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "RHBZ#1661005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12122" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Slowloris HTTP Denial of Service" }, { "cve": "CVE-2018-12123", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1661010" } ], "notes": [ { "category": "description", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Hostname spoofing in URL parser for javascript protocol", "title": "Vulnerability summary" }, { "category": "other", "text": "The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "RHBZ#1661010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1661010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12123", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12123" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Hostname spoofing in URL parser for javascript protocol" }, { "cve": "CVE-2019-5737", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1690808" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server\u0027s headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "RHBZ#1690808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1690808" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5737", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5737" }, { "category": "external", "summary": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/", "url": "https://nodejs.org/ja/blog/vulnerability/february-2019-security-releases/" } ], "release_date": "2019-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack.", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "nodejs: Insufficient Slowloris fix causing DoS via server.headersTimeout bypass" }, { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-01T10:03:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2939" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-debuginfo-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-devel-0:10.16.3-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-nodejs-docs-0:10.16.3-3.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-npm-0:6.9.0-10.16.3.3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-runtime-0:3.2-3.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs10-scldevel-0:3.2-3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
rhsa-2020:3197
Vulnerability from csaf_redhat
Published
2020-07-29 06:21
Modified
2025-08-07 12:25
Summary
Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update
Notes
Topic
An update is now available for Red Hat Process Automation Manager.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.
This release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)
* netty: HTTP request smuggling (CVE-2019-20444)
* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)
* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)
* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)
* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)
* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)
* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)
* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)
* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)
* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)
* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)
* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)
* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)
* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)
* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)
* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)
* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)
* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)
* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)
* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)
* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)
* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)
* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)
* netty: compression/decompression codecs don't enforce limits on buffer allocation sizes (CVE-2020-11612)
* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)
* keycloak: security issue on reset credential flow (CVE-2020-1718)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis release of Red Hat Process Automation Manager 7.8.0 serves as an update to Red Hat Process Automation Manager 7.7.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* commons-beanutils: apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)\n\n* netty: HTTP request smuggling (CVE-2019-20444)\n\n* netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)\n\n* netty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\n* netty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* netty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* netty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)\n\n* cxf-core: cxf: does not restrict the number of message attachments (CVE-2019-12406)\n\n* cxf-core: cxf: OpenId Connect token service does not properly validate the clientId (CVE-2019-12423)\n\n* cxf-core: cxf: reflected XSS in the services listing page (CVE-2019-17573)\n\n* jackson-databind: lacks certain net.sf.ehcache blocking (CVE-2019-20330)\n\n* jackson-databind: Lacks certain xbean-reflect/JNDI blocking (CVE-2020-8840)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)\n\n* jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)\n\n* jackson-databind: Serialization gadgets in anteros-core (CVE-2020-9548)\n\n* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)\n\n* jackson-databind: Serialization gadgets in ibatis-sqlmap (CVE-2020-9547)\n\n* jackson-databind: Serialization gadgets in javax.swing.JEditorPane (CVE-2020-10969)\n\n* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)\n\n* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)\n\n* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)\n\n* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)\n\n* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)\n\n* jackson-databind: Serialization gadgets in shaded-hikari-config (CVE-2020-9546)\n\n* jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool (CVE-2020-14062)\n\n* jackson-databind: serialization in weblogic/oracle-aqjms (CVE-2020-14061)\n\n* jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (CVE-2020-14060)\n\n* netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes (CVE-2020-11612)\n\n* quartz: libquartz: XXE attacks via job description (CVE-2019-13990)\n\n* keycloak: security issue on reset credential flow (CVE-2020-1718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3197", "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=rhpam\u0026version=7.8.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_process_automation_manager/7.8/html/release_notes_for_red_hat_process_automation_manager_7.8/index" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3197.json" } ], "title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.8.0 Security Update", "tracking": { "current_release_date": "2025-08-07T12:25:52+00:00", "generator": { "date": "2025-08-07T12:25:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3197", "initial_release_date": "2020-07-29T06:21:49+00:00", "revision_history": [ { "date": "2020-07-29T06:21:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T06:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T12:25:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Process Automation 7", "product": { "name": "Red Hat Process Automation 7", "product_id": "Red Hat Process Automation 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.8" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" }, { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1767483" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Commons BeanUtils, where the class property in PropertyUtilsBean is not suppressed by default. This flaw allows an attacker to access the classloader.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10086" }, { "category": "external", "summary": "RHBZ#1767483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1767483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10086", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt", "url": "https://commons.apache.org/proper/commons-beanutils/javadocs/v1.9.4/RELEASE-NOTES.txt" } ], "release_date": "2019-08-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "There is no currently known mitigation for this flaw.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default" }, { "cve": "CVE-2019-12406", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816170" } ], "notes": [ { "category": "description", "text": "Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property \"attachment-max-count\".", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: does not restrict the number of message attachments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12406" }, { "category": "external", "summary": "RHBZ#1816170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816170" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12406", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12406" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12406" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: does not restrict the number of message attachments" }, { "cve": "CVE-2019-12423", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797006" } ], "notes": [ { "category": "description", "text": "Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter \"rs.security.keystore.type\" to \"jwk\". For this case all keys are returned in this file \"as is\", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. \"oct\" keys, which contain secret keys, are not returned at all.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: OpenId Connect token service does not properly validate the clientId", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12423" }, { "category": "external", "summary": "RHBZ#1797006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797006" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12423", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12423" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: OpenId Connect token service does not properly validate the clientId" }, { "cve": "CVE-2019-13990", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2019-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1801149" } ], "notes": [ { "category": "description", "text": "The Terracotta Quartz Scheduler is susceptible to an XML external entity attack (XXE) through a job description. This issue stems from inadequate handling of XML external entity (XXE) declarations in the initDocumentParser function within xml/XMLSchedulingDataProcessor.java. By enticing a victim to access a maliciously crafted job description (containing XML content), a remote attacker could exploit this vulnerability to execute an XXE attack on the targeted system.", "title": "Vulnerability description" }, { "category": "summary", "text": "libquartz: XXE attacks via job description", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 uses a vulnerable version of libquartz as a dependency for Candlepin. However, the \u003cjob\u003e\u003cdescrition\u003e entry is not used, and the vulnerability can not be triggered. An update may fix the code in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-13990" }, { "category": "external", "summary": "RHBZ#1801149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1801149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-13990", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13990" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13990" } ], "release_date": "2019-07-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libquartz: XXE attacks via job description" }, { "cve": "CVE-2019-16869", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2019-09-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1758619" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where whitespace before the colon in HTTP headers is mishandled. This flaw allows an attacker to cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that this vulnerability does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-16869" }, { "category": "external", "summary": "RHBZ#1758619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-16869", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16869" } ], "release_date": "2019-09-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers" }, { "cve": "CVE-2019-17573", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1797011" } ], "notes": [ { "category": "description", "text": "By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is not typically not present in modern browsers, who remove dot segments before sending the request. However, Mobile applications may be vulnerable.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf: reflected XSS in the services listing page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17573" }, { "category": "external", "summary": "RHBZ#1797011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797011" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17573", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17573" } ], "release_date": "2020-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Mitigate this flaw by disabling the service listing altogether; via setting the \"hide-service-list-page\" servlet parameter to \"true\".", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cxf: reflected XSS in the services listing page" }, { "cve": "CVE-2019-20330", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1793154" } ], "notes": [ { "category": "description", "text": "FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: lacks certain net.sf.ehcache blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20330" }, { "category": "external", "summary": "RHBZ#1793154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20330", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20330" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20330" } ], "release_date": "2020-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: lacks certain net.sf.ehcache blocking" }, { "cve": "CVE-2019-20444", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798524" } ], "notes": [ { "category": "description", "text": "A HTTP smuggling flaw was found in HttpObjectDecoder.java in Netty in versions prior to version 4.1.44. HTTP headers with an invalid fold, in this case CRLF (carriage return, line feed) without being followed by SP (space) or HTAB (horizontal tab), result in situations where headers can be misread. Data integrity is the highest threat with this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not pose a substantial practical threat to ElasticSearch 6. We agree that these issues would be difficult to exploit on OpenShift Container Platform so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20444" }, { "category": "external", "summary": "RHBZ#1798524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20444", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20444" }, { "category": "external", "summary": "https://github.com/elastic/elasticsearch/issues/49396", "url": "https://github.com/elastic/elasticsearch/issues/49396" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP request smuggling" }, { "cve": "CVE-2019-20445", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1798509" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty before version 4.1.44, where it accepted multiple Content-Length headers and also accepted both Transfer-Encoding, as well as Content-Length headers where it should reject the message under such circumstances. In circumstances where Netty is used in the context of a server, it could result in a viable HTTP smuggling vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships a vulnerable version of netty embedded in Candlepin. However, the flaw can not be triggered in that context, because HTTP requests are handled by Tomcat, not by netty. A future release may fix this.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20445" }, { "category": "external", "summary": "RHBZ#1798509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20445", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20445" } ], "release_date": "2020-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header" }, { "cve": "CVE-2020-1718", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2020-01-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796756" } ], "notes": [ { "category": "description", "text": "A flaw was found in the reset credential flow in Keycloak. This flaw allows an attacker to gain unauthorized access to the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak: security issue on reset credential flow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1718" }, { "category": "external", "summary": "RHBZ#1796756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1718" } ], "release_date": "2020-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "Disable reset credential flow.", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "keycloak: security issue on reset credential flow" }, { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-8840", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816330" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind in versions 2.0.0 through 2.9.10.2. A \"gadget\" exploit is possible due to a lack of a Java object being blocking from being deserialized. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8840" }, { "category": "external", "summary": "RHBZ#1816330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8840", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8840" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8840" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Lacks certain xbean-reflect/JNDI blocking" }, { "cve": "CVE-2020-9546", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816332" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in shaded-hikari-config", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9546" }, { "category": "external", "summary": "RHBZ#1816332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9546", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9546" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in shaded-hikari-config" }, { "cve": "CVE-2020-9547", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816337" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in ibatis-sqlmap", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9547" }, { "category": "external", "summary": "RHBZ#1816337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9547", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9547" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in ibatis-sqlmap" }, { "cve": "CVE-2020-9548", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816340" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in anteros-core", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9548" }, { "category": "external", "summary": "RHBZ#1816340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9548", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9548" } ], "release_date": "2020-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in anteros-core" }, { "cve": "CVE-2020-10672", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815495" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10672" }, { "category": "external", "summary": "RHBZ#1815495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10672", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10672" } ], "release_date": "2020-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10673", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1815470" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time. Additionally, the gadget is not available within Red Hat Openstack Platform\u0027s OpenDaylight.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10673" }, { "category": "external", "summary": "RHBZ#1815470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1815470" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10673", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10673" } ], "release_date": "2020-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution" }, { "cve": "CVE-2020-10968", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819208" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x prior to version 2.9.10.4. The interaction between serialization gadgets and typing is mishandled in the bus-proxy. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10968" }, { "category": "external", "summary": "RHBZ#1819208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10968", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10968" } ], "release_date": "2020-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider" }, { "cve": "CVE-2020-10969", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1819212" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10969" }, { "category": "external", "summary": "RHBZ#1819212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10969", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10969" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10969" } ], "release_date": "2020-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in javax.swing.JEditorPane" }, { "cve": "CVE-2020-11111", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821304" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11111" }, { "category": "external", "summary": "RHBZ#1821304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821304" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11111", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11111" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2664", "url": "https://github.com/FasterXML/jackson-databind/issues/2664" } ], "release_date": "2020-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory" }, { "cve": "CVE-2020-11112", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821311" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11112" }, { "category": "external", "summary": "RHBZ#1821311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821311" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11112", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11112" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2666", "url": "https://github.com/FasterXML/jackson-databind/issues/2666" } ], "release_date": "2020-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider" }, { "cve": "CVE-2020-11113", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2020-03-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1821315" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.4. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11113" }, { "category": "external", "summary": "RHBZ#1821315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1821315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11113", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11113" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11113" }, { "category": "external", "summary": "https://github.com/FasterXML/jackson-databind/issues/2670", "url": "https://github.com/FasterXML/jackson-databind/issues/2670" } ], "release_date": "2020-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime" }, { "cve": "CVE-2020-11612", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1816216" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty in the way it handles the amount of data it compresses and decompresses. The Compression/Decompression codecs should enforce memory allocation size limits to avoid an Out of Memory Error (OOME) or exhaustion of the memory pool.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform end users don\u0027t have direct access to send requests to ElasticSearch. A user could need access to the ElasticSearch service on the internal cluster network in order to be able to send malicious requests to it.\n\n\nThird party scanners flagging Red Hat Satellite due to availability of the higher version packages in Red Hat AMQ Clients (through errata RHSA-2020:2605) compare to the qpid packages from Satellite Tools repository. qpid dependency fixed in errata RHSA-2020:2605 was for Red Hat AMQ Clients and it doesn\u0027t necessarily mean that packages from Satellite Tools are affected. These are two different products with different architecture and code-base. Updating the packages from any other repository than the Satellite-tools repository is not recommended for Satellite Customers. \n\nRed Hat Satellite 6.7 and earlier ship affected version of netty, however, there is no external connection being exposed and it is used by only Artemis to open an internal connection within the JVM. Since netty does not come into contact with untrusted data, vulnerability is not exposed in product code and there is no breach of Confidentiality, Integrity or Availability expected from this vulnerability. We may update the netty and its dependency in a future release.\n\nMore information regarding Satellite related packages can be found on KCS: https://access.redhat.com/solutions/5200591", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11612" }, { "category": "external", "summary": "RHBZ#1816216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11612", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11612" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11612" } ], "release_date": "2020-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: compression/decompression codecs don\u0027t enforce limits on buffer allocation sizes" }, { "cve": "CVE-2020-11619", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826805" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in org.springframework:spring-aop", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11619" }, { "category": "external", "summary": "RHBZ#1826805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826805" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11619", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11619" } ], "release_date": "2020-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in org.springframework:spring-aop" }, { "cve": "CVE-2020-11620", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1826798" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nWhile OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used. We may update the jackson-databind dependency in a future release.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11620" }, { "category": "external", "summary": "RHBZ#1826798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1826798" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11620", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11620" } ], "release_date": "2020-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* `enableDefaultTyping()`\n* `@JsonTypeInfo using `id.CLASS` or `id.MINIMAL_CLASS`", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: Serialization gadgets in commons-jelly:commons-jelly" }, { "cve": "CVE-2020-14060", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848960" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. The interaction between serialization gadgets and typing is mishandled. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14060" }, { "category": "external", "summary": "RHBZ#1848960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14060", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14060" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oadd.org.apache.xalan.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool" }, { "cve": "CVE-2020-14061", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848966" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in weblogic/oracle-aqjms", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14061" }, { "category": "external", "summary": "RHBZ#1848966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14061", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14061" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14061" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* oracle.jms.AQjms*ConnectionFactory in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in weblogic/oracle-aqjms" }, { "cve": "CVE-2020-14062", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1848962" } ], "notes": [ { "category": "description", "text": "A flaw was found in jackson-databind 2.x in versions prior to 2.9.10.5. FasterXML jackson-databind 2.x mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform\u0027s elasticsearch plugins do ship the vulnerable component, it doesn\u0027t do any of the unsafe things described in https://access.redhat.com/solutions/3279231. We may update the jackson-databind dependency in a future release.\n\nRed Hat OpenStack Platform ships OpenDaylight, which contains the vulnerable jackson-databind. However, OpenDaylight does not expose jackson-databind in a way that would make it vulnerable, lowering the impact of the vulnerability for OpenDaylight. As such, Red Hat will not be providing a fix for OpenDaylight at this time.\n\nThe PKI module as shipped in Red Hat Enterprise Linux 8 and Red Hat Satellite 6 does not enable polymorphic deserialization which is a required configuration for the vulnerability to be used, lowering the impact of the vulnerability for the Product. We may update the jackson-databind dependency in a future release.\n\nThe version of jackson-databind as shipped in Red Hat Software Collections rh-maven35 is used only while building maven, thus it does not deserialize data coming from untrusted sources, lowering the impact of the vulnerability for the Product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Process Automation 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14062" }, { "category": "external", "summary": "RHBZ#1848962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14062", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14062" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14062" } ], "release_date": "2020-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T06:21:49+00:00", "details": "For on-premise installations, before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Process Automation 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3197" }, { "category": "workaround", "details": "The following conditions are needed for an exploit, we recommend avoiding all if possible:\n* Deserialization from sources you do not control\n* enableDefaultTyping()\n* @JsonTypeInfo using id.CLASS or id.MINIMAL_CLASS\n* com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in classpath", "product_ids": [ "Red Hat Process Automation 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Process Automation 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool" } ] }
rhsa-2019:2955
Vulnerability from csaf_redhat
Published
2019-10-02 14:29
Modified
2025-08-07 09:56
Summary
Red Hat Security Advisory: rh-nodejs8-nodejs security update
Notes
Topic
An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nodejs8-nodejs is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.\n\nThe following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.16.1).\n\nSecurity Fix(es):\n\n* HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)\n\n* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)\n\n* HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)\n\n* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)\n\n* HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)\n\n* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)\n\n* HTTP/2: request for large response leads to denial of service (CVE-2019-9517)\n\n* HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2955", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2955.json" } ], "title": "Red Hat Security Advisory: rh-nodejs8-nodejs security update", "tracking": { "current_release_date": "2025-08-07T09:56:18+00:00", "generator": { "date": "2025-08-07T09:56:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2955", "initial_release_date": "2019-10-02T14:29:13+00:00", "revision_history": [ { "date": "2019-10-02T14:29:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-02T14:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-07T09:56:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=aarch64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.src", "product": { "name": "rh-nodejs8-0:3.0-5.el7.src", "product_id": "rh-nodejs8-0:3.0-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=src" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-runtime@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_id": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-scldevel@3.0-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-devel@8.16.1-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_id": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-npm@6.4.1-8.16.1.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_id": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-debuginfo@8.16.1-2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_id": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nodejs8-nodejs-docs@8.16.1-2.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-Alt-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)", "product_id": "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64" }, "product_reference": "rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch" }, "product_reference": "rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64" }, "product_reference": "rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "relates_to_product_reference": "7Workstation-RHSCL-3.3" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" }, "product_reference": "rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-3.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741860" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker can request a large amount of data by manipulating window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this queue can consume excess CPU, memory, or both, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: large amount of data requests leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "There are no mitigations available for nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "RHBZ#1741860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9511", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9511" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9511" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: large amount of data requests leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9512", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735645" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using PING frames and queuing of response PING ACK frames, a flood attack could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PING frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "RHBZ#1735645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9512", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9512" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9512" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PING frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9513", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735741" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, using PRIORITY frames to flood the system, could cause excessive CPU usage and starvation of other clients. The largest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for packages nghttp2 and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "RHBZ#1735741", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735741" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9513", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9513" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/", "url": "https://nghttp2.org/blog/2019/08/19/nghttp2-v1-39-2/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using PRIORITY frames results in excessive resource consumption" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9514", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735744" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using HEADER frames with invalid HTTP headers and queuing of response RST_STREAM frames, an attacker could cause a flood resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using HEADERS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "The golang package in Red Hat OpenStack Platform 9 Operational Tools will not be updated for this flaw because it is in technical preview and is retiring as of 24.Aug.2019.\nThis issue did not affect the versions of grafana(embeds golang) as shipped with Red Hat Ceph Storage 2 and Red Hat Gluster Storage 3 as they did not include the support for HTTP/2.\nThe following storage product versions are affected because they include the support for HTTP/2 in:\n* golang as shipped with Red Hat Gluster Storage 3, Red Hat Ceph Storage 2 and Red Hat Ceph Storage 3\n* heketi(embeds golang) as shipped with Red Hat Gluster Storage 3\n* grafana(embeds golang and grpc) as shipped with Red Hat Ceph Storage 3\nThis flaw has no available mitigation for packages golang and nodejs. Both packages will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.\n\nAll OpenShift Container Platform RPMs and container images that are built with Go and support HTTP/2 are vulnerable to this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "RHBZ#1735744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9514", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9514" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9514" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg", "url": "https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/wlHLHit1BqA" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using HEADERS frames results in unbounded memory growth" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9515", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735745" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using SETTINGS frames and queuing of SETTINGS ACK frames, a flood could occur resulting in unbounded memory growth. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of grafana(embeds gRPC) as shipped with Red Hat Ceph Storage 3 as it include the support for HTTP/2.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "RHBZ#1735745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735745" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9515", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9515" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html", "url": "https://www.mail-archive.com/grpc-io@googlegroups.com/msg06408.html" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using SETTINGS frames results in unbounded memory growth" }, { "cve": "CVE-2019-9516", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741864" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. An attacker, sending a stream of header with a 0-length header name and a 0-length header value, could cause some implementations to allocate memory for these headers and keep the allocations alive until the session dies. The can consume excess memory, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: 0-length headers lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "RHBZ#1741864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9516", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9516" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://github.com/nghttp2/nghttp2/issues/1382#", "url": "https://github.com/nghttp2/nghttp2/issues/1382#" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" }, { "category": "external", "summary": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/", "url": "https://www.nginx.com/blog/nginx-updates-mitigate-august-2019-http-2-vulnerabilities/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "Red Hat Quay 3.0 uses Nginx 1.12 from Red Hat Software Collections. It will be updated once a fixed is released for Software Collections. In the meantime users of Quay can disable http/2 support in Nginx by following these instructions:\n\n1. Copy the Nginx configuration from the quay container to the host\n$ docker cp 3aadf1421ba3:/quay-registry/conf/nginx/ /mnt/quay/nginx\n\n2. Edit the Nginx configuration, removing http/2 support\n$ sed -i \u0027s/http2 //g\u0027 /mnt/quay/nginx/nginx.conf\n\n3. Restart Nginx with the new configuration mounted into the container, eg:\n$ docker run --restart=always -p 443:8443 -p 80:8080 --sysctl net.core.somaxconn=4096 -v /mnt/quay/config:/conf/stack:Z -v /mnt/quay/storage:/datastorage -v /mnt/quay/nginx:/quay-registry/config/nginx:Z -d quay.io/redhat/quay:v3.0.3", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: 0-length headers lead to denial of service" }, { "cve": "CVE-2019-9517", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1741868" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in HTTP/2. An attacker can open a HTTP/2 window so the peer can send without constraint. The TCP window remains closed so the peer cannot write the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the server\u0027s queue is setup, the responses can consume excess memory, CPU, or both, potentially leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: request for large response leads to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "The package httpd versions as shipped with Red Hat Enterprise Linux 5, 6 and 7 are not affected by this issue as HTTP/2 support is not provided.\nThis flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "RHBZ#1741868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9517", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9517" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://kb.cert.org/vuls/id/605641/", "url": "https://kb.cert.org/vuls/id/605641/" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "category": "workaround", "details": "The httpd version shipped with Red Hat Enterprise Linux 8 provides HTTP/2 support through mod_http2 package. While mod_http2 package is not updated, users can disable HTTP/2 support as mitigation action by executing the following steps:\n\n1. Stop httpd service:\n$ systemctl stop httpd\n\n2. Remove http/2 protocol support from configuration files:\n$ sed -i \u0027s/\\(h2\\)\\|\\(h2c\\)//g\u0027 \u003chttpd_config_file\u003e\n\n3. Validate configuration files to make sure all syntax is valid:\n$ apachectl configtest\n\n4. Restart httpd service:\n$ systemctl start httpd", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: request for large response leads to denial of service" }, { "acknowledgments": [ { "names": [ "the Envoy security team" ] } ], "cve": "CVE-2019-9518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-08-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1735749" } ], "notes": [ { "category": "description", "text": "A flaw was found in HTTP/2. Using frames with an empty payload, a flood could occur that results in excessive CPU usage and starvation of other clients. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTP/2: flood using empty frames results in excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has no available mitigation for nodejs package. It will be updated once the available fixes are released for Red Hat Enterprise Linux and Red Hat Software Collections.\n\nThe nodejs RPM shipped in OpenShift Container Platform 3.9 and 3.10 is not affected by this flaw as it does not contain the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "RHBZ#1735749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9518", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "category": "external", "summary": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/", "url": "https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/" } ], "release_date": "2019-08-13T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-02T14:29:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2955" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-Alt-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.5.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.6.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3-7.7.Z:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Server-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.src", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-debuginfo-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-devel-0:8.16.1-2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-nodejs-docs-0:8.16.1-2.el7.noarch", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-npm-0:6.4.1-8.16.1.2.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-runtime-0:3.0-5.el7.x86_64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.aarch64", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.ppc64le", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.s390x", "7Workstation-RHSCL-3.3:rh-nodejs8-scldevel-0:3.0-5.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "HTTP/2: flood using empty frames results in excessive resource consumption" } ] }
suse-su-2020:0059-1
Vulnerability from csaf_suse
Published
2020-01-09 12:30
Modified
2020-01-09 12:30
Summary
Security update for nodejs12
Notes
Title of the patch
Security update for nodejs12
Description of the patch
This update for nodejs12 fixes the following issues:
Update to LTS release 12.13.0 (jsc#SLE-8947).
Security issues fixed:
- CVE-2019-9511: Fixed the HTTP/2 implementation that was vulnerable to window size manipulations (bsc#1146091).
- CVE-2019-9512: Fixed the HTTP/2 implementation that was vulnerable to floods using PING frames (bsc#1146099).
- CVE-2019-9513: Fixed the HTTP/2 implementation that was vulnerable to resource loops, potentially leading to a denial of service (bsc#1146094).
- CVE-2019-9514: Fixed the HTTP/2 implementation that was vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed the HTTP/2 implementation that was vulnerable to a SETTINGS frame flood (bsc#1146100).
- CVE-2019-9516: Fixed the HTTP/2 implementation that was vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed the HTTP/2 implementation that was vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed the HTTP/2 implementation that was vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
- CVE-2019-13173: Fixed a file overwrite in the fstream.DirWriter() function (bsc#1140290).
Patchnames
SUSE-2020-59,SUSE-SLE-Module-Web-Scripting-12-2020-59
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs12", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs12 fixes the following issues:\n\nUpdate to LTS release 12.13.0 (jsc#SLE-8947).\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed the HTTP/2 implementation that was vulnerable to window size manipulations (bsc#1146091).\n- CVE-2019-9512: Fixed the HTTP/2 implementation that was vulnerable to floods using PING frames (bsc#1146099).\n- CVE-2019-9513: Fixed the HTTP/2 implementation that was vulnerable to resource loops, potentially leading to a denial of service (bsc#1146094).\n- CVE-2019-9514: Fixed the HTTP/2 implementation that was vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed the HTTP/2 implementation that was vulnerable to a SETTINGS frame flood (bsc#1146100).\n- CVE-2019-9516: Fixed the HTTP/2 implementation that was vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed the HTTP/2 implementation that was vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed the HTTP/2 implementation that was vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n- CVE-2019-13173: Fixed a file overwrite in the fstream.DirWriter() function (bsc#1140290).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-59,SUSE-SLE-Module-Web-Scripting-12-2020-59", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0059-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:0059-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200059-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:0059-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149792", "url": "https://bugzilla.suse.com/1149792" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE Bug SLE-8947", "url": "https://bugzilla.suse.com/SLE-8947" } ], "title": "Security update for nodejs12", "tracking": { "current_release_date": "2020-01-09T12:30:16Z", "generator": { "date": "2020-01-09T12:30:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:0059-1", "initial_release_date": "2020-01-09T12:30:16Z", "revision_history": [ { "date": "2020-01-09T12:30:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64", "product_id": "nodejs12-devel-12.13.0-1.3.1.aarch64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.aarch64", "product": { "name": "npm12-12.13.0-1.3.1.aarch64", "product_id": "npm12-12.13.0-1.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch", "product_id": "nodejs12-docs-12.13.0-1.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "product_id": "nodejs12-devel-12.13.0-1.3.1.ppc64le" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.ppc64le", "product": { "name": "npm12-12.13.0-1.3.1.ppc64le", "product_id": "npm12-12.13.0-1.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-12.13.0-1.3.1.s390x", "product_id": "nodejs12-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x", "product_id": "nodejs12-devel-12.13.0-1.3.1.s390x" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.s390x", "product": { "name": "npm12-12.13.0-1.3.1.s390x", "product_id": "npm12-12.13.0-1.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs12-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64", "product_id": "nodejs12-devel-12.13.0-1.3.1.x86_64" } }, { "category": "product_version", "name": "npm12-12.13.0-1.3.1.x86_64", "product": { "name": "npm12-12.13.0-1.3.1.x86_64", "product_id": "npm12-12.13.0-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-devel-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64" }, "product_reference": "nodejs12-devel-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs12-docs-12.13.0-1.3.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch" }, "product_reference": "nodejs12-docs-12.13.0-1.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64" }, "product_reference": "npm12-12.13.0-1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le" }, "product_reference": "npm12-12.13.0-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x" }, "product_reference": "npm12-12.13.0-1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm12-12.13.0-1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" }, "product_reference": "npm12-12.13.0-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "moderate" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-devel-12.13.0-1.3.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs12-docs-12.13.0-1.3.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm12-12.13.0-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-09T12:30:16Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:14246-1
Vulnerability from csaf_suse
Published
2020-01-17 17:07
Modified
2020-01-17 17:07
Summary
Security update for Mozilla Firefox
Notes
Title of the patch
Security update for Mozilla Firefox
Description of the patch
This update contains the Mozilla Firefox ESR 68.2 release.
Mozilla Firefox was updated to ESR 68.2 release:
* Enterprise: New administrative policies were added. More
information and templates are available at the Policy
Templates page.
* Various security fixes:
MFSA 2019-33 (bsc#1154738)
* CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber
* CVE-2019-11757: Use-after-free when creating index updates in IndexedDB
* CVE-2019-11758: Potentially exploitable crash due to 360 Total Security
* CVE-2019-11759: Stack buffer overflow in HKDF output
* CVE-2019-11760: Stack buffer overflow in WebRTC networking
* CVE-2019-11761: Unintended access to a privileged JSONView object
* CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation
* CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique
* CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2
Other Issues resolved:
* [bsc#1104841] Newer versions of firefox have a dependency on
GLIBCXX_3.4.20
* [bsc#1074235] MozillaFirefox: background tab crash reports sent
inadvertently without user opt-in
* [bsc#1043008] Firefox hangs randomly when browsing and
scrolling
* [bsc#1025108] Firefox stops loading page until mouse is moved
* [bsc#905528] Firefox malfunctions due to broken omni.ja
archives
Patchnames
slessp4-firefox-201910-14246
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Mozilla Firefox", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update contains the Mozilla Firefox ESR 68.2 release.\n\nMozilla Firefox was updated to ESR 68.2 release:\n\n* Enterprise: New administrative policies were added. More\n information and templates are available at the Policy\n Templates page.\n\n* Various security fixes:\n MFSA 2019-33 (bsc#1154738)\n * CVE-2019-15903: Heap overflow in expat library in XML_GetCurrentLineNumber\n * CVE-2019-11757: Use-after-free when creating index updates in IndexedDB\n * CVE-2019-11758: Potentially exploitable crash due to 360 Total Security\n * CVE-2019-11759: Stack buffer overflow in HKDF output\n * CVE-2019-11760: Stack buffer overflow in WebRTC networking\n * CVE-2019-11761: Unintended access to a privileged JSONView object\n * CVE-2019-11762: document.domain-based origin isolation has same-origin- property violation\n * CVE-2019-11763: Incorrect HTML parsing results in XSS bypass technique\n * CVE-2019-11764: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2\n\nOther Issues resolved:\n\n* [bsc#1104841] Newer versions of firefox have a dependency on\n GLIBCXX_3.4.20\n* [bsc#1074235] MozillaFirefox: background tab crash reports sent\n inadvertently without user opt-in\n* [bsc#1043008] Firefox hangs randomly when browsing and\n scrolling\n* [bsc#1025108] Firefox stops loading page until mouse is moved\n* [bsc#905528] Firefox malfunctions due to broken omni.ja\n archives\n\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-firefox-201910-14246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14246-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14246-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14246-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" }, { "category": "self", "summary": "SUSE Bug 1000036", "url": "https://bugzilla.suse.com/1000036" }, { "category": "self", "summary": "SUSE Bug 1001652", "url": "https://bugzilla.suse.com/1001652" }, { "category": "self", "summary": "SUSE Bug 1025108", "url": "https://bugzilla.suse.com/1025108" }, { "category": "self", "summary": "SUSE Bug 1029377", "url": "https://bugzilla.suse.com/1029377" }, { "category": "self", "summary": "SUSE Bug 1029902", "url": "https://bugzilla.suse.com/1029902" }, { "category": "self", "summary": "SUSE Bug 1040164", "url": "https://bugzilla.suse.com/1040164" }, { "category": "self", "summary": "SUSE Bug 104105", "url": "https://bugzilla.suse.com/104105" }, { "category": "self", "summary": "SUSE Bug 1042670", "url": "https://bugzilla.suse.com/1042670" }, { "category": "self", "summary": "SUSE Bug 1043008", "url": "https://bugzilla.suse.com/1043008" }, { "category": "self", "summary": "SUSE Bug 1044946", "url": "https://bugzilla.suse.com/1044946" }, { "category": "self", "summary": "SUSE Bug 1047925", "url": "https://bugzilla.suse.com/1047925" }, { "category": "self", "summary": "SUSE Bug 1047936", "url": "https://bugzilla.suse.com/1047936" }, { "category": "self", "summary": "SUSE Bug 1048299", "url": "https://bugzilla.suse.com/1048299" }, { "category": "self", "summary": "SUSE Bug 1049186", "url": "https://bugzilla.suse.com/1049186" }, { "category": "self", "summary": "SUSE Bug 1050653", "url": "https://bugzilla.suse.com/1050653" }, { "category": "self", "summary": "SUSE Bug 1056058", "url": "https://bugzilla.suse.com/1056058" }, { "category": "self", "summary": "SUSE Bug 1058013", "url": "https://bugzilla.suse.com/1058013" }, { "category": "self", "summary": "SUSE Bug 1066242", "url": "https://bugzilla.suse.com/1066242" }, { "category": "self", "summary": "SUSE Bug 1066953", "url": "https://bugzilla.suse.com/1066953" }, { "category": "self", "summary": "SUSE Bug 1070738", "url": "https://bugzilla.suse.com/1070738" }, { "category": "self", "summary": "SUSE Bug 1070853", "url": "https://bugzilla.suse.com/1070853" }, { "category": "self", "summary": "SUSE Bug 1072320", "url": "https://bugzilla.suse.com/1072320" }, { "category": "self", "summary": "SUSE Bug 1072322", "url": "https://bugzilla.suse.com/1072322" }, { "category": "self", "summary": "SUSE Bug 1073796", "url": "https://bugzilla.suse.com/1073796" }, { "category": "self", "summary": "SUSE Bug 1073798", "url": "https://bugzilla.suse.com/1073798" }, { "category": "self", "summary": "SUSE Bug 1073799", "url": "https://bugzilla.suse.com/1073799" }, { "category": "self", "summary": "SUSE Bug 1073803", "url": "https://bugzilla.suse.com/1073803" }, { "category": "self", "summary": "SUSE Bug 1073808", "url": "https://bugzilla.suse.com/1073808" }, { "category": "self", "summary": "SUSE Bug 1073818", "url": "https://bugzilla.suse.com/1073818" }, { "category": "self", "summary": "SUSE Bug 1073823", "url": "https://bugzilla.suse.com/1073823" }, { "category": "self", "summary": "SUSE Bug 1073829", "url": "https://bugzilla.suse.com/1073829" }, { "category": "self", "summary": "SUSE Bug 1073830", "url": "https://bugzilla.suse.com/1073830" }, { "category": "self", "summary": "SUSE Bug 1073832", "url": "https://bugzilla.suse.com/1073832" }, { "category": "self", "summary": "SUSE Bug 1073846", "url": "https://bugzilla.suse.com/1073846" }, { "category": "self", "summary": "SUSE Bug 1074235", "url": "https://bugzilla.suse.com/1074235" }, { "category": "self", "summary": "SUSE Bug 1077230", "url": "https://bugzilla.suse.com/1077230" }, { "category": "self", "summary": "SUSE Bug 1079761", "url": "https://bugzilla.suse.com/1079761" }, { "category": "self", "summary": "SUSE Bug 1081750", "url": "https://bugzilla.suse.com/1081750" }, { "category": "self", "summary": "SUSE Bug 1082318", "url": "https://bugzilla.suse.com/1082318" }, { "category": "self", "summary": "SUSE Bug 1087453", "url": "https://bugzilla.suse.com/1087453" }, { "category": "self", "summary": "SUSE Bug 1087459", "url": "https://bugzilla.suse.com/1087459" }, { "category": "self", "summary": "SUSE Bug 1087463", "url": "https://bugzilla.suse.com/1087463" }, { "category": "self", "summary": "SUSE Bug 1088573", "url": "https://bugzilla.suse.com/1088573" }, { "category": "self", "summary": "SUSE Bug 1091764", "url": "https://bugzilla.suse.com/1091764" }, { "category": "self", "summary": "SUSE Bug 1094814", "url": "https://bugzilla.suse.com/1094814" }, { "category": "self", "summary": "SUSE Bug 1097158", "url": "https://bugzilla.suse.com/1097158" }, { "category": "self", "summary": "SUSE Bug 1097375", "url": "https://bugzilla.suse.com/1097375" }, { "category": "self", "summary": "SUSE Bug 1097401", "url": "https://bugzilla.suse.com/1097401" }, { "category": "self", "summary": "SUSE Bug 1097404", "url": "https://bugzilla.suse.com/1097404" }, { "category": "self", "summary": "SUSE Bug 1097748", "url": "https://bugzilla.suse.com/1097748" }, { "category": "self", "summary": "SUSE Bug 1104841", "url": "https://bugzilla.suse.com/1104841" }, { "category": "self", "summary": "SUSE Bug 1105019", "url": "https://bugzilla.suse.com/1105019" }, { "category": "self", "summary": "SUSE Bug 1107030", "url": "https://bugzilla.suse.com/1107030" }, { "category": "self", "summary": "SUSE Bug 1109465", "url": "https://bugzilla.suse.com/1109465" }, { "category": "self", "summary": "SUSE Bug 1117473", "url": "https://bugzilla.suse.com/1117473" }, { "category": "self", "summary": "SUSE Bug 1117626", "url": "https://bugzilla.suse.com/1117626" }, { "category": "self", "summary": "SUSE Bug 1117627", "url": "https://bugzilla.suse.com/1117627" }, { "category": "self", "summary": "SUSE Bug 1117629", "url": "https://bugzilla.suse.com/1117629" }, { "category": "self", "summary": "SUSE Bug 1117630", "url": "https://bugzilla.suse.com/1117630" }, { "category": "self", "summary": "SUSE Bug 1120644", "url": "https://bugzilla.suse.com/1120644" }, { "category": "self", "summary": "SUSE Bug 1122191", "url": "https://bugzilla.suse.com/1122191" }, { "category": "self", "summary": "SUSE Bug 1123482", "url": "https://bugzilla.suse.com/1123482" }, { "category": "self", "summary": "SUSE Bug 1124525", "url": "https://bugzilla.suse.com/1124525" }, { "category": "self", "summary": "SUSE Bug 1127532", "url": "https://bugzilla.suse.com/1127532" }, { "category": "self", "summary": "SUSE Bug 1129346", "url": "https://bugzilla.suse.com/1129346" }, { "category": "self", "summary": "SUSE Bug 1130694", "url": "https://bugzilla.suse.com/1130694" }, { "category": "self", "summary": "SUSE Bug 1130840", "url": "https://bugzilla.suse.com/1130840" }, { "category": "self", "summary": "SUSE Bug 1133452", "url": "https://bugzilla.suse.com/1133452" }, { "category": "self", "summary": "SUSE Bug 1133810", "url": "https://bugzilla.suse.com/1133810" }, { "category": "self", "summary": "SUSE Bug 1134209", "url": "https://bugzilla.suse.com/1134209" }, { "category": "self", "summary": "SUSE Bug 1138459", "url": "https://bugzilla.suse.com/1138459" }, { "category": "self", "summary": "SUSE Bug 1140290", "url": "https://bugzilla.suse.com/1140290" }, { "category": "self", "summary": "SUSE Bug 1140868", "url": "https://bugzilla.suse.com/1140868" }, { "category": "self", "summary": "SUSE Bug 1141853", "url": "https://bugzilla.suse.com/1141853" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1145665", "url": "https://bugzilla.suse.com/1145665" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE Bug 1149323", "url": "https://bugzilla.suse.com/1149323" }, { "category": "self", "summary": "SUSE Bug 1153423", "url": "https://bugzilla.suse.com/1153423" }, { "category": "self", "summary": "SUSE Bug 1154738", "url": "https://bugzilla.suse.com/1154738" }, { "category": "self", "summary": "SUSE Bug 1447070", "url": "https://bugzilla.suse.com/1447070" }, { "category": "self", "summary": "SUSE Bug 1447409", "url": "https://bugzilla.suse.com/1447409" }, { "category": "self", "summary": "SUSE Bug 744625", "url": "https://bugzilla.suse.com/744625" }, { "category": "self", "summary": "SUSE Bug 744629", "url": "https://bugzilla.suse.com/744629" }, { "category": "self", "summary": "SUSE Bug 845955", "url": "https://bugzilla.suse.com/845955" }, { "category": "self", "summary": "SUSE Bug 865853", "url": "https://bugzilla.suse.com/865853" }, { "category": "self", "summary": "SUSE Bug 905528", "url": "https://bugzilla.suse.com/905528" }, { "category": "self", "summary": "SUSE Bug 917607", "url": "https://bugzilla.suse.com/917607" }, { "category": "self", "summary": "SUSE Bug 935856", "url": "https://bugzilla.suse.com/935856" }, { "category": "self", "summary": "SUSE Bug 937414", "url": "https://bugzilla.suse.com/937414" }, { "category": "self", "summary": "SUSE Bug 947747", "url": "https://bugzilla.suse.com/947747" }, { "category": "self", "summary": "SUSE Bug 948045", "url": "https://bugzilla.suse.com/948045" }, { "category": "self", "summary": "SUSE Bug 948602", "url": "https://bugzilla.suse.com/948602" }, { "category": "self", "summary": "SUSE Bug 955142", "url": "https://bugzilla.suse.com/955142" }, { "category": "self", "summary": "SUSE Bug 957814", "url": "https://bugzilla.suse.com/957814" }, { "category": "self", "summary": "SUSE Bug 957815", "url": "https://bugzilla.suse.com/957815" }, { "category": "self", "summary": "SUSE Bug 961254", "url": "https://bugzilla.suse.com/961254" }, { "category": "self", "summary": "SUSE Bug 962297", "url": "https://bugzilla.suse.com/962297" }, { "category": "self", "summary": "SUSE Bug 966076", "url": "https://bugzilla.suse.com/966076" }, { "category": "self", "summary": "SUSE Bug 966077", "url": "https://bugzilla.suse.com/966077" }, { "category": "self", "summary": "SUSE Bug 985201", "url": "https://bugzilla.suse.com/985201" }, { "category": "self", "summary": "SUSE Bug 986541", "url": "https://bugzilla.suse.com/986541" }, { "category": "self", "summary": "SUSE Bug 991344", "url": "https://bugzilla.suse.com/991344" }, { "category": "self", "summary": "SUSE Bug 998743", "url": "https://bugzilla.suse.com/998743" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2882 page", "url": "https://www.suse.com/security/cve/CVE-2013-2882/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6639 page", "url": "https://www.suse.com/security/cve/CVE-2013-6639/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6640 page", "url": "https://www.suse.com/security/cve/CVE-2013-6640/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6668 page", "url": "https://www.suse.com/security/cve/CVE-2013-6668/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0224 page", "url": "https://www.suse.com/security/cve/CVE-2014-0224/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3193 page", "url": "https://www.suse.com/security/cve/CVE-2015-3193/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3194 page", "url": "https://www.suse.com/security/cve/CVE-2015-3194/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5380 page", "url": "https://www.suse.com/security/cve/CVE-2015-5380/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7384 page", "url": "https://www.suse.com/security/cve/CVE-2015-7384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2086 page", "url": "https://www.suse.com/security/cve/CVE-2016-2086/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2178 page", "url": "https://www.suse.com/security/cve/CVE-2016-2178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2216 page", "url": "https://www.suse.com/security/cve/CVE-2016-2216/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5172 page", "url": "https://www.suse.com/security/cve/CVE-2016-5172/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5325 page", "url": "https://www.suse.com/security/cve/CVE-2016-5325/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6304 page", "url": "https://www.suse.com/security/cve/CVE-2016-6304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6306 page", "url": "https://www.suse.com/security/cve/CVE-2016-6306/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7052 page", "url": "https://www.suse.com/security/cve/CVE-2016-7052/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7099 page", "url": "https://www.suse.com/security/cve/CVE-2016-7099/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000381 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000381/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10686 page", "url": "https://www.suse.com/security/cve/CVE-2017-10686/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11111 page", "url": "https://www.suse.com/security/cve/CVE-2017-11111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11499 page", "url": "https://www.suse.com/security/cve/CVE-2017-11499/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14228 page", "url": "https://www.suse.com/security/cve/CVE-2017-14228/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14849 page", "url": "https://www.suse.com/security/cve/CVE-2017-14849/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14919 page", "url": "https://www.suse.com/security/cve/CVE-2017-14919/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15896 page", "url": "https://www.suse.com/security/cve/CVE-2017-15896/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15897 page", "url": "https://www.suse.com/security/cve/CVE-2017-15897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17810 page", "url": "https://www.suse.com/security/cve/CVE-2017-17810/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17811 page", "url": "https://www.suse.com/security/cve/CVE-2017-17811/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17812 page", "url": "https://www.suse.com/security/cve/CVE-2017-17812/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17813 page", "url": "https://www.suse.com/security/cve/CVE-2017-17813/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17814 page", "url": "https://www.suse.com/security/cve/CVE-2017-17814/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17815 page", "url": "https://www.suse.com/security/cve/CVE-2017-17815/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17816 page", "url": "https://www.suse.com/security/cve/CVE-2017-17816/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17817 page", "url": "https://www.suse.com/security/cve/CVE-2017-17817/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17818 page", "url": "https://www.suse.com/security/cve/CVE-2017-17818/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17819 page", "url": "https://www.suse.com/security/cve/CVE-2017-17819/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17820 page", "url": "https://www.suse.com/security/cve/CVE-2017-17820/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18207 page", "url": "https://www.suse.com/security/cve/CVE-2017-18207/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3735 page", "url": "https://www.suse.com/security/cve/CVE-2017-3735/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3736 page", "url": "https://www.suse.com/security/cve/CVE-2017-3736/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3738 page", "url": "https://www.suse.com/security/cve/CVE-2017-3738/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0732 page", "url": "https://www.suse.com/security/cve/CVE-2018-0732/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000168 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000168/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12115 page", "url": "https://www.suse.com/security/cve/CVE-2018-12115/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12116 page", "url": "https://www.suse.com/security/cve/CVE-2018-12116/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12121 page", "url": "https://www.suse.com/security/cve/CVE-2018-12121/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12122 page", "url": "https://www.suse.com/security/cve/CVE-2018-12122/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12123 page", "url": "https://www.suse.com/security/cve/CVE-2018-12123/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20406 page", "url": "https://www.suse.com/security/cve/CVE-2018-20406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20852 page", "url": "https://www.suse.com/security/cve/CVE-2018-20852/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7158 page", "url": "https://www.suse.com/security/cve/CVE-2018-7158/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7159 page", "url": "https://www.suse.com/security/cve/CVE-2018-7159/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7160 page", "url": "https://www.suse.com/security/cve/CVE-2018-7160/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7161 page", "url": "https://www.suse.com/security/cve/CVE-2018-7161/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7167 page", "url": "https://www.suse.com/security/cve/CVE-2018-7167/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10160 page", "url": "https://www.suse.com/security/cve/CVE-2019-10160/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11709 page", "url": "https://www.suse.com/security/cve/CVE-2019-11709/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11710 page", "url": "https://www.suse.com/security/cve/CVE-2019-11710/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11711 page", "url": "https://www.suse.com/security/cve/CVE-2019-11711/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11712 page", "url": "https://www.suse.com/security/cve/CVE-2019-11712/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11713 page", "url": "https://www.suse.com/security/cve/CVE-2019-11713/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11714 page", "url": "https://www.suse.com/security/cve/CVE-2019-11714/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11715 page", "url": "https://www.suse.com/security/cve/CVE-2019-11715/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11716 page", "url": "https://www.suse.com/security/cve/CVE-2019-11716/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11717 page", "url": "https://www.suse.com/security/cve/CVE-2019-11717/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11718 page", "url": "https://www.suse.com/security/cve/CVE-2019-11718/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11719 page", "url": "https://www.suse.com/security/cve/CVE-2019-11719/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11720 page", "url": "https://www.suse.com/security/cve/CVE-2019-11720/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11721 page", "url": "https://www.suse.com/security/cve/CVE-2019-11721/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11723 page", "url": "https://www.suse.com/security/cve/CVE-2019-11723/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11724 page", "url": "https://www.suse.com/security/cve/CVE-2019-11724/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11725 page", "url": "https://www.suse.com/security/cve/CVE-2019-11725/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11727 page", "url": "https://www.suse.com/security/cve/CVE-2019-11727/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11728 page", "url": "https://www.suse.com/security/cve/CVE-2019-11728/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11729 page", "url": "https://www.suse.com/security/cve/CVE-2019-11729/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11730 page", "url": "https://www.suse.com/security/cve/CVE-2019-11730/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11733 page", "url": "https://www.suse.com/security/cve/CVE-2019-11733/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11735 page", "url": "https://www.suse.com/security/cve/CVE-2019-11735/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11736 page", "url": "https://www.suse.com/security/cve/CVE-2019-11736/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11738 page", "url": "https://www.suse.com/security/cve/CVE-2019-11738/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11740 page", "url": "https://www.suse.com/security/cve/CVE-2019-11740/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11742 page", "url": "https://www.suse.com/security/cve/CVE-2019-11742/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11743 page", "url": "https://www.suse.com/security/cve/CVE-2019-11743/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11744 page", "url": "https://www.suse.com/security/cve/CVE-2019-11744/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11746 page", "url": "https://www.suse.com/security/cve/CVE-2019-11746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11747 page", "url": "https://www.suse.com/security/cve/CVE-2019-11747/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11748 page", "url": "https://www.suse.com/security/cve/CVE-2019-11748/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11749 page", "url": "https://www.suse.com/security/cve/CVE-2019-11749/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11750 page", "url": "https://www.suse.com/security/cve/CVE-2019-11750/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11751 page", "url": "https://www.suse.com/security/cve/CVE-2019-11751/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11752 page", "url": "https://www.suse.com/security/cve/CVE-2019-11752/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11753 page", "url": "https://www.suse.com/security/cve/CVE-2019-11753/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11757 page", "url": "https://www.suse.com/security/cve/CVE-2019-11757/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11758 page", "url": "https://www.suse.com/security/cve/CVE-2019-11758/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11759 page", "url": "https://www.suse.com/security/cve/CVE-2019-11759/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11760 page", "url": "https://www.suse.com/security/cve/CVE-2019-11760/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11761 page", "url": "https://www.suse.com/security/cve/CVE-2019-11761/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11762 page", "url": "https://www.suse.com/security/cve/CVE-2019-11762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11763 page", "url": "https://www.suse.com/security/cve/CVE-2019-11763/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11764 page", "url": "https://www.suse.com/security/cve/CVE-2019-11764/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-13173 page", "url": "https://www.suse.com/security/cve/CVE-2019-13173/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15903 page", "url": "https://www.suse.com/security/cve/CVE-2019-15903/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5010 page", "url": "https://www.suse.com/security/cve/CVE-2019-5010/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-5737 page", "url": "https://www.suse.com/security/cve/CVE-2019-5737/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9636 page", "url": "https://www.suse.com/security/cve/CVE-2019-9636/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9811 page", "url": "https://www.suse.com/security/cve/CVE-2019-9811/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9812 page", "url": "https://www.suse.com/security/cve/CVE-2019-9812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9947 page", "url": "https://www.suse.com/security/cve/CVE-2019-9947/" } ], "title": "Security update for Mozilla Firefox", "tracking": { "current_release_date": "2020-01-17T17:07:38Z", "generator": { "date": "2020-01-17T17:07:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14246-1", "initial_release_date": "2020-01-17T17:07:38Z", "revision_history": [ { "date": "2020-01-17T17:07:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "product_id": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "product_id": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" } }, { "category": "product_version", "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "product_id": "firefox-atk-lang-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "product_id": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "product_id": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-lang-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "product_id": "firefox-glib2-tools-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-data-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "product_id": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "product_id": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "product_id": "firefox-libcairo2-1.15.10-2.13.4.x86_64" } }, { "category": "product_version", "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "product_id": "firefox-libffi4-5.3.1+r233831-14.1.x86_64" } }, { "category": "product_version", "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "product_id": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64" } }, { "category": "product_version", "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "product_id": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" } }, { "category": "product_version", "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "product_id": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" } }, { "category": "product_version", "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "product_id": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" } }, { "category": "product_version", "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "product_id": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" } }, { "category": "product_version", "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "product_id": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" } }, { "category": "product_version", "name": "libfreebl3-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-3.45-38.9.3.x86_64", "product_id": "libfreebl3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64", "product_id": "libfreebl3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "product_id": "libsoftokn3-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-32bit-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "product_id": "mozilla-nspr-devel-4.21-29.6.1.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-devel-3.45-38.9.3.x86_64" } }, { "category": "product_version", "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64", "product_id": "mozilla-nss-tools-3.45-38.9.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64" }, "product_reference": "MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64" }, "product_reference": "MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-atk-lang-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-atk-lang-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-lang-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-lang-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-glib2-tools-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64" }, "product_reference": "firefox-glib2-tools-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-data-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-data-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64" }, "product_reference": "firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libcairo2-1.15.10-2.13.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64" }, "product_reference": "firefox-libcairo2-1.15.10-2.13.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi4-5.3.1+r233831-14.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64" }, "product_reference": "firefox-libffi4-5.3.1+r233831-14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64" }, "product_reference": "firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64" }, "product_reference": "firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64" }, "product_reference": "firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64" }, "product_reference": "firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64" }, "product_reference": "firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64" }, "product_reference": "libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libfreebl3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libfreebl3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libsoftokn3-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64" }, "product_reference": "libsoftokn3-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-32bit-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-32bit-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nspr-devel-4.21-29.6.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64" }, "product_reference": "mozilla-nspr-devel-4.21-29.6.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-devel-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-devel-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "mozilla-nss-tools-3.45-38.9.3.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" }, "product_reference": "mozilla-nss-tools-3.45-38.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-2882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2882" } ], "notes": [ { "category": "general", "text": "Google V8, as used in Google Chrome before 28.0.1500.95, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2882", "url": "https://www.suse.com/security/cve/CVE-2013-2882" }, { "category": "external", "summary": "SUSE Bug 833343 for CVE-2013-2882", "url": "https://bugzilla.suse.com/833343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-2882" }, { "cve": "CVE-2013-6639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6639" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6639", "url": "https://www.suse.com/security/cve/CVE-2013-6639" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6639", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6639" }, { "cve": "CVE-2013-6640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6640" } ], "notes": [ { "category": "general", "text": "The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6640", "url": "https://www.suse.com/security/cve/CVE-2013-6640" }, { "category": "external", "summary": "SUSE Bug 854473 for CVE-2013-6640", "url": "https://bugzilla.suse.com/854473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6640" }, { "cve": "CVE-2013-6668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6668" } ], "notes": [ { "category": "general", "text": "Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6668", "url": "https://www.suse.com/security/cve/CVE-2013-6668" }, { "category": "external", "summary": "SUSE Bug 866959 for CVE-2013-6668", "url": "https://bugzilla.suse.com/866959" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2013-6668" }, { "cve": "CVE-2014-0224", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0224" } ], "notes": [ { "category": "general", "text": "OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0224", "url": "https://www.suse.com/security/cve/CVE-2014-0224" }, { "category": "external", "summary": "SUSE Bug 1146657 for CVE-2014-0224", "url": "https://bugzilla.suse.com/1146657" }, { "category": "external", "summary": "SUSE Bug 880891 for CVE-2014-0224", "url": "https://bugzilla.suse.com/880891" }, { "category": "external", "summary": "SUSE Bug 881743 for CVE-2014-0224", "url": "https://bugzilla.suse.com/881743" }, { "category": "external", "summary": "SUSE Bug 883126 for CVE-2014-0224", "url": "https://bugzilla.suse.com/883126" }, { "category": "external", "summary": "SUSE Bug 885777 for CVE-2014-0224", "url": "https://bugzilla.suse.com/885777" }, { "category": "external", "summary": "SUSE Bug 892403 for CVE-2014-0224", "url": "https://bugzilla.suse.com/892403" }, { "category": "external", "summary": "SUSE Bug 901237 for CVE-2014-0224", "url": "https://bugzilla.suse.com/901237" }, { "category": "external", "summary": "SUSE Bug 903703 for CVE-2014-0224", "url": "https://bugzilla.suse.com/903703" }, { "category": "external", "summary": "SUSE Bug 905018 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905018" }, { "category": "external", "summary": "SUSE Bug 905106 for CVE-2014-0224", "url": "https://bugzilla.suse.com/905106" }, { "category": "external", "summary": "SUSE Bug 914447 for CVE-2014-0224", "url": "https://bugzilla.suse.com/914447" }, { "category": "external", "summary": "SUSE Bug 915913 for CVE-2014-0224", "url": "https://bugzilla.suse.com/915913" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-0224", "url": "https://bugzilla.suse.com/916239" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2014-0224" }, { "cve": "CVE-2015-3193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3193" } ], "notes": [ { "category": "general", "text": "The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3193", "url": "https://www.suse.com/security/cve/CVE-2015-3193" }, { "category": "external", "summary": "SUSE Bug 1022086 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1022086" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2015-3193", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2015-3193", "url": "https://bugzilla.suse.com/957814" }, { "category": "external", "summary": "SUSE Bug 960151 for CVE-2015-3193", "url": "https://bugzilla.suse.com/960151" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3193", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3193" }, { "cve": "CVE-2015-3194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3194" } ], "notes": [ { "category": "general", "text": "crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3194", "url": "https://www.suse.com/security/cve/CVE-2015-3194" }, { "category": "external", "summary": "SUSE Bug 957812 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957812" }, { "category": "external", "summary": "SUSE Bug 957815 for CVE-2015-3194", "url": "https://bugzilla.suse.com/957815" }, { "category": "external", "summary": "SUSE Bug 958768 for CVE-2015-3194", "url": "https://bugzilla.suse.com/958768" }, { "category": "external", "summary": "SUSE Bug 976341 for CVE-2015-3194", "url": "https://bugzilla.suse.com/976341" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2015-3194", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-3194" }, { "cve": "CVE-2015-5380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5380" } ], "notes": [ { "category": "general", "text": "The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5380", "url": "https://www.suse.com/security/cve/CVE-2015-5380" }, { "category": "external", "summary": "SUSE Bug 937414 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937414" }, { "category": "external", "summary": "SUSE Bug 937416 for CVE-2015-5380", "url": "https://bugzilla.suse.com/937416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2015-5380" }, { "cve": "CVE-2015-7384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7384" } ], "notes": [ { "category": "general", "text": "Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7384", "url": "https://www.suse.com/security/cve/CVE-2015-7384" }, { "category": "external", "summary": "SUSE Bug 948602 for CVE-2015-7384", "url": "https://bugzilla.suse.com/948602" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2015-7384" }, { "cve": "CVE-2016-2086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2086" } ], "notes": [ { "category": "general", "text": "Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2086", "url": "https://www.suse.com/security/cve/CVE-2016-2086" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2086", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2086" }, { "cve": "CVE-2016-2178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2178" } ], "notes": [ { "category": "general", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2178", "url": "https://www.suse.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2178", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 983249 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983249" }, { "category": "external", "summary": "SUSE Bug 983519 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983519" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2178", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-2216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2216" } ], "notes": [ { "category": "general", "text": "The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2216", "url": "https://www.suse.com/security/cve/CVE-2016-2216" }, { "category": "external", "summary": "SUSE Bug 966076 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966076" }, { "category": "external", "summary": "SUSE Bug 966077 for CVE-2016-2216", "url": "https://bugzilla.suse.com/966077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-2216" }, { "cve": "CVE-2016-5172", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5172" } ], "notes": [ { "category": "general", "text": "The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5172", "url": "https://www.suse.com/security/cve/CVE-2016-5172" }, { "category": "external", "summary": "SUSE Bug 998743 for CVE-2016-5172", "url": "https://bugzilla.suse.com/998743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-5172" }, { "cve": "CVE-2016-5325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5325" } ], "notes": [ { "category": "general", "text": "CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5325", "url": "https://www.suse.com/security/cve/CVE-2016-5325" }, { "category": "external", "summary": "SUSE Bug 985201 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985201" }, { "category": "external", "summary": "SUSE Bug 985202 for CVE-2016-5325", "url": "https://bugzilla.suse.com/985202" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-5325" }, { "cve": "CVE-2016-6304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6304" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6304", "url": "https://www.suse.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "SUSE Bug 1001706 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1001706" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1005579 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1005579" }, { "category": "external", "summary": "SUSE Bug 1021375 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1021375" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999666 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6306" } ], "notes": [ { "category": "general", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6306", "url": "https://www.suse.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6306", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999668 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-7052", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7052" } ], "notes": [ { "category": "general", "text": "crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7052", "url": "https://www.suse.com/security/cve/CVE-2016-7052" }, { "category": "external", "summary": "SUSE Bug 1001148 for CVE-2016-7052", "url": "https://bugzilla.suse.com/1001148" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7052" }, { "cve": "CVE-2016-7099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7099" } ], "notes": [ { "category": "general", "text": "The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7099", "url": "https://www.suse.com/security/cve/CVE-2016-7099" }, { "category": "external", "summary": "SUSE Bug 1001652 for CVE-2016-7099", "url": "https://bugzilla.suse.com/1001652" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2016-7099" }, { "cve": "CVE-2017-1000381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000381" } ], "notes": [ { "category": "general", "text": "The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000381", "url": "https://www.suse.com/security/cve/CVE-2017-1000381" }, { "category": "external", "summary": "SUSE Bug 1044946 for CVE-2017-1000381", "url": "https://bugzilla.suse.com/1044946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-1000381" }, { "cve": "CVE-2017-10686", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10686" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there are multiple heap use after free vulnerabilities in the tool nasm. The related heap is allocated in the token() function and freed in the detoken() function (called by pp_getline()) - it is used again at multiple positions later that could cause multiple damages. For example, it causes a corrupted double-linked list in detoken(), a double free or corruption in delete_Token(), and an out-of-bounds write in detoken(). It has a high possibility to lead to a remote code execution attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10686", "url": "https://www.suse.com/security/cve/CVE-2017-10686" }, { "category": "external", "summary": "SUSE Bug 1047936 for CVE-2017-10686", "url": "https://bugzilla.suse.com/1047936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-10686" }, { "cve": "CVE-2017-11111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11111" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, preproc.c allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11111", "url": "https://www.suse.com/security/cve/CVE-2017-11111" }, { "category": "external", "summary": "SUSE Bug 1047925 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1047925" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-11111", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-11111" }, { "cve": "CVE-2017-11499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11499" } ], "notes": [ { "category": "general", "text": "Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11499", "url": "https://www.suse.com/security/cve/CVE-2017-11499" }, { "category": "external", "summary": "SUSE Bug 1044849 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1044849" }, { "category": "external", "summary": "SUSE Bug 1048299 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1048299" }, { "category": "external", "summary": "SUSE Bug 1051117 for CVE-2017-11499", "url": "https://bugzilla.suse.com/1051117" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-11499" }, { "cve": "CVE-2017-14228", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14228" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function paste_tokens() in preproc.c, aka a NULL pointer dereference. It will lead to remote denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14228", "url": "https://www.suse.com/security/cve/CVE-2017-14228" }, { "category": "external", "summary": "SUSE Bug 1058013 for CVE-2017-14228", "url": "https://bugzilla.suse.com/1058013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14228" }, { "cve": "CVE-2017-14849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14849" } ], "notes": [ { "category": "general", "text": "Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to \"..\" handling was incompatible with the pathname validation used by unspecified community modules.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14849", "url": "https://www.suse.com/security/cve/CVE-2017-14849" }, { "category": "external", "summary": "SUSE Bug 1060820 for CVE-2017-14849", "url": "https://bugzilla.suse.com/1060820" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2017-14849" }, { "cve": "CVE-2017-14919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14919" } ], "notes": [ { "category": "general", "text": "Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14919", "url": "https://www.suse.com/security/cve/CVE-2017-14919" }, { "category": "external", "summary": "SUSE Bug 1059050 for CVE-2017-14919", "url": "https://bugzilla.suse.com/1059050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-14919" }, { "cve": "CVE-2017-15896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15896" } ], "notes": [ { "category": "general", "text": "Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15896", "url": "https://www.suse.com/security/cve/CVE-2017-15896" }, { "category": "external", "summary": "SUSE Bug 1071905 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1071905" }, { "category": "external", "summary": "SUSE Bug 1072322 for CVE-2017-15896", "url": "https://bugzilla.suse.com/1072322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15896" }, { "cve": "CVE-2017-15897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15897" } ], "notes": [ { "category": "general", "text": "Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, \u0027Buffer.alloc(0x100, \"This is not correctly encoded\", \"hex\");\u0027 The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15897", "url": "https://www.suse.com/security/cve/CVE-2017-15897" }, { "category": "external", "summary": "SUSE Bug 1072320 for CVE-2017-15897", "url": "https://bugzilla.suse.com/1072320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-15897" }, { "cve": "CVE-2017-17810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17810" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a \"SEGV on unknown address\" that will cause a remote denial of service attack, because asm/preproc.c mishandles macro calls that have the wrong number of arguments.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17810", "url": "https://www.suse.com/security/cve/CVE-2017-17810" }, { "category": "external", "summary": "SUSE Bug 1073796 for CVE-2017-17810", "url": "https://bugzilla.suse.com/1073796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17810" }, { "cve": "CVE-2017-17811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17811" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer overflow that will cause a remote denial of service attack, related to a strcpy in paste_tokens in asm/preproc.c, a similar issue to CVE-2017-11111.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17811", "url": "https://www.suse.com/security/cve/CVE-2017-17811" }, { "category": "external", "summary": "SUSE Bug 1073798 for CVE-2017-17811", "url": "https://bugzilla.suse.com/1073798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17811" }, { "cve": "CVE-2017-17812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17812" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read in the function detoken() in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17812", "url": "https://www.suse.com/security/cve/CVE-2017-17812" }, { "category": "external", "summary": "SUSE Bug 1073799 for CVE-2017-17812", "url": "https://bugzilla.suse.com/1073799" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17812" }, { "cve": "CVE-2017-17813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17813" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in the pp_list_one_macro function in asm/preproc.c that will cause a remote denial of service attack, related to mishandling of line-syntax errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17813", "url": "https://www.suse.com/security/cve/CVE-2017-17813" }, { "category": "external", "summary": "SUSE Bug 1073803 for CVE-2017-17813", "url": "https://bugzilla.suse.com/1073803" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17813" }, { "cve": "CVE-2017-17814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17814" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in do_directive in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17814", "url": "https://www.suse.com/security/cve/CVE-2017-17814" }, { "category": "external", "summary": "SUSE Bug 1073808 for CVE-2017-17814", "url": "https://bugzilla.suse.com/1073808" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17814" }, { "cve": "CVE-2017-17815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17815" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in is_mmacro() in asm/preproc.c that will cause a remote denial of service attack, because of a missing check for the relationship between minimum and maximum parameter counts.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17815", "url": "https://www.suse.com/security/cve/CVE-2017-17815" }, { "category": "external", "summary": "SUSE Bug 1073818 for CVE-2017-17815", "url": "https://bugzilla.suse.com/1073818" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17815" }, { "cve": "CVE-2017-17816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17816" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_getline in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17816", "url": "https://www.suse.com/security/cve/CVE-2017-17816" }, { "category": "external", "summary": "SUSE Bug 1073823 for CVE-2017-17816", "url": "https://bugzilla.suse.com/1073823" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17816" }, { "cve": "CVE-2017-17817", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17817" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_verror in asm/preproc.c that will cause a remote denial of service attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17817", "url": "https://www.suse.com/security/cve/CVE-2017-17817" }, { "category": "external", "summary": "SUSE Bug 1073829 for CVE-2017-17817", "url": "https://bugzilla.suse.com/1073829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17817" }, { "cve": "CVE-2017-17818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17818" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a heap-based buffer over-read that will cause a remote denial of service attack, related to a while loop in paste_tokens in asm/preproc.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17818", "url": "https://www.suse.com/security/cve/CVE-2017-17818" }, { "category": "external", "summary": "SUSE Bug 1073830 for CVE-2017-17818", "url": "https://bugzilla.suse.com/1073830" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17818" }, { "cve": "CVE-2017-17819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17819" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is an illegal address access in the function find_cc() in asm/preproc.c that will cause a remote denial of service attack, because pointers associated with skip_white_ calls are not validated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17819", "url": "https://www.suse.com/security/cve/CVE-2017-17819" }, { "category": "external", "summary": "SUSE Bug 1073832 for CVE-2017-17819", "url": "https://bugzilla.suse.com/1073832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17819" }, { "cve": "CVE-2017-17820", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17820" } ], "notes": [ { "category": "general", "text": "In Netwide Assembler (NASM) 2.14rc0, there is a use-after-free in pp_list_one_macro in asm/preproc.c that will lead to a remote denial of service attack, related to mishandling of operand-type errors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17820", "url": "https://www.suse.com/security/cve/CVE-2017-17820" }, { "category": "external", "summary": "SUSE Bug 1073846 for CVE-2017-17820", "url": "https://bugzilla.suse.com/1073846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-17820" }, { "cve": "CVE-2017-18207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18207" } ], "notes": [ { "category": "general", "text": "The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications \"need to be prepared to handle a wide variety of exceptions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18207", "url": "https://www.suse.com/security/cve/CVE-2017-18207" }, { "category": "external", "summary": "SUSE Bug 1083507 for CVE-2017-18207", "url": "https://bugzilla.suse.com/1083507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-18207" }, { "cve": "CVE-2017-3735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3735" } ], "notes": [ { "category": "general", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3735", "url": "https://www.suse.com/security/cve/CVE-2017-3735" }, { "category": "external", "summary": "SUSE Bug 1056058 for CVE-2017-3735", "url": "https://bugzilla.suse.com/1056058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3736" } ], "notes": [ { "category": "general", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3736", "url": "https://www.suse.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "SUSE Bug 1066242 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1066242" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1076369 for CVE-2017-3736", "url": "https://bugzilla.suse.com/1076369" }, { "category": "external", "summary": "SUSE Bug 957814 for CVE-2017-3736", "url": "https://bugzilla.suse.com/957814" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3738" } ], "notes": [ { "category": "general", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3738", "url": "https://www.suse.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "SUSE Bug 1071906 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1071906" }, { "category": "external", "summary": "SUSE Bug 1097757 for CVE-2017-3738", "url": "https://bugzilla.suse.com/1097757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2017-3738" }, { "cve": "CVE-2018-0732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0732" } ], "notes": [ { "category": "general", "text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0732", "url": "https://www.suse.com/security/cve/CVE-2018-0732" }, { "category": "external", "summary": "SUSE Bug 1077628 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1077628" }, { "category": "external", "summary": "SUSE Bug 1097158 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1097158" }, { "category": "external", "summary": "SUSE Bug 1099502 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1099502" }, { "category": "external", "summary": "SUSE Bug 1106692 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1106692" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1110163 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1110163" }, { "category": "external", "summary": "SUSE Bug 1112097 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1112097" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-1000168", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000168" } ], "notes": [ { "category": "general", "text": "nghttp2 version \u003e= 1.10.0 and nghttp2 \u003c= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in \u003e= 1.31.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000168", "url": "https://www.suse.com/security/cve/CVE-2018-1000168" }, { "category": "external", "summary": "SUSE Bug 1088639 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1088639" }, { "category": "external", "summary": "SUSE Bug 1097401 for CVE-2018-1000168", "url": "https://bugzilla.suse.com/1097401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-1000168" }, { "cve": "CVE-2018-12115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12115" } ], "notes": [ { "category": "general", "text": "In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `\u0027ucs2\u0027`, `\u0027ucs-2\u0027`, `\u0027utf16le\u0027` and `\u0027utf-16le\u0027`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12115", "url": "https://www.suse.com/security/cve/CVE-2018-12115" }, { "category": "external", "summary": "SUSE Bug 1105019 for CVE-2018-12115", "url": "https://bugzilla.suse.com/1105019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12115" }, { "cve": "CVE-2018-12116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12116" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12116", "url": "https://www.suse.com/security/cve/CVE-2018-12116" }, { "category": "external", "summary": "SUSE Bug 1117630 for CVE-2018-12116", "url": "https://bugzilla.suse.com/1117630" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12116" }, { "cve": "CVE-2018-12121", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12121" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12121", "url": "https://www.suse.com/security/cve/CVE-2018-12121" }, { "category": "external", "summary": "SUSE Bug 1117626 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1117626" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2018-12121", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12121" }, { "cve": "CVE-2018-12122", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12122" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12122", "url": "https://www.suse.com/security/cve/CVE-2018-12122" }, { "category": "external", "summary": "SUSE Bug 1117627 for CVE-2018-12122", "url": "https://bugzilla.suse.com/1117627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2018-12122" }, { "cve": "CVE-2018-12123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12123" } ], "notes": [ { "category": "general", "text": "Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12123", "url": "https://www.suse.com/security/cve/CVE-2018-12123" }, { "category": "external", "summary": "SUSE Bug 1117629 for CVE-2018-12123", "url": "https://bugzilla.suse.com/1117629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-12123" }, { "cve": "CVE-2018-20406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20406" } ], "notes": [ { "category": "general", "text": "Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a \"resize to twice the size\" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20406", "url": "https://www.suse.com/security/cve/CVE-2018-20406" }, { "category": "external", "summary": "SUSE Bug 1120644 for CVE-2018-20406", "url": "https://bugzilla.suse.com/1120644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-20406" }, { "cve": "CVE-2018-20852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20852" } ], "notes": [ { "category": "general", "text": "http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20852", "url": "https://www.suse.com/security/cve/CVE-2018-20852" }, { "category": "external", "summary": "SUSE Bug 1141853 for CVE-2018-20852", "url": "https://bugzilla.suse.com/1141853" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-20852" }, { "cve": "CVE-2018-7158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7158" } ], "notes": [ { "category": "general", "text": "The `\u0027path\u0027` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. The regular expression, `splitPathRe`, used within the `\u0027path\u0027` module for the various path parsing functions, including `path.dirname()`, `path.extname()` and `path.parse()` was structured in such a way as to allow an attacker to craft a string, that when passed through one of these functions, could take a significant amount of time to evaluate, potentially leading to a full denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7158", "url": "https://www.suse.com/security/cve/CVE-2018-7158" }, { "category": "external", "summary": "SUSE Bug 1087459 for CVE-2018-7158", "url": "https://bugzilla.suse.com/1087459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7158" }, { "cve": "CVE-2018-7159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7159" } ], "notes": [ { "category": "general", "text": "The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7159", "url": "https://www.suse.com/security/cve/CVE-2018-7159" }, { "category": "external", "summary": "SUSE Bug 1087453 for CVE-2018-7159", "url": "https://bugzilla.suse.com/1087453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2018-7159" }, { "cve": "CVE-2018-7160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7160" } ], "notes": [ { "category": "general", "text": "The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7160", "url": "https://www.suse.com/security/cve/CVE-2018-7160" }, { "category": "external", "summary": "SUSE Bug 1087463 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1087463" }, { "category": "external", "summary": "SUSE Bug 1182620 for CVE-2018-7160", "url": "https://bugzilla.suse.com/1182620" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7160" }, { "cve": "CVE-2018-7161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7161" } ], "notes": [ { "category": "general", "text": "All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7161", "url": "https://www.suse.com/security/cve/CVE-2018-7161" }, { "category": "external", "summary": "SUSE Bug 1097404 for CVE-2018-7161", "url": "https://bugzilla.suse.com/1097404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7161" }, { "cve": "CVE-2018-7167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7167" } ], "notes": [ { "category": "general", "text": "Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS \"Boron\"), 8.x (LTS \"Carbon\"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7167", "url": "https://www.suse.com/security/cve/CVE-2018-7167" }, { "category": "external", "summary": "SUSE Bug 1097375 for CVE-2018-7167", "url": "https://bugzilla.suse.com/1097375" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2018-7167" }, { "cve": "CVE-2019-10160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10160" } ], "notes": [ { "category": "general", "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10160", "url": "https://www.suse.com/security/cve/CVE-2019-10160" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-10160", "url": "https://bugzilla.suse.com/1138459" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-10160" }, { "cve": "CVE-2019-11709", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11709" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11709", "url": "https://www.suse.com/security/cve/CVE-2019-11709" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11709", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11709" }, { "cve": "CVE-2019-11710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11710" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11710", "url": "https://www.suse.com/security/cve/CVE-2019-11710" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11710", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11710" }, { "cve": "CVE-2019-11711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11711" } ], "notes": [ { "category": "general", "text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11711", "url": "https://www.suse.com/security/cve/CVE-2019-11711" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11711", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11711" }, { "cve": "CVE-2019-11712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11712" } ], "notes": [ { "category": "general", "text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11712", "url": "https://www.suse.com/security/cve/CVE-2019-11712" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11712", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11712" }, { "cve": "CVE-2019-11713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11713" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11713", "url": "https://www.suse.com/security/cve/CVE-2019-11713" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11713", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11713" }, { "cve": "CVE-2019-11714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11714" } ], "notes": [ { "category": "general", "text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11714", "url": "https://www.suse.com/security/cve/CVE-2019-11714" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11714", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11714" }, { "cve": "CVE-2019-11715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11715" } ], "notes": [ { "category": "general", "text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11715", "url": "https://www.suse.com/security/cve/CVE-2019-11715" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11715", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11715" }, { "cve": "CVE-2019-11716", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11716" } ], "notes": [ { "category": "general", "text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11716", "url": "https://www.suse.com/security/cve/CVE-2019-11716" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11716", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11716" }, { "cve": "CVE-2019-11717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11717" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11717", "url": "https://www.suse.com/security/cve/CVE-2019-11717" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11717", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11717" }, { "cve": "CVE-2019-11718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11718" } ], "notes": [ { "category": "general", "text": "Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11718", "url": "https://www.suse.com/security/cve/CVE-2019-11718" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11718", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11718" }, { "cve": "CVE-2019-11719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11719" } ], "notes": [ { "category": "general", "text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11719", "url": "https://www.suse.com/security/cve/CVE-2019-11719" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11719", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11719" }, { "cve": "CVE-2019-11720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11720" } ], "notes": [ { "category": "general", "text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11720", "url": "https://www.suse.com/security/cve/CVE-2019-11720" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11720", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11720" }, { "cve": "CVE-2019-11721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11721" } ], "notes": [ { "category": "general", "text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11721", "url": "https://www.suse.com/security/cve/CVE-2019-11721" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11721", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11721" }, { "cve": "CVE-2019-11723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11723" } ], "notes": [ { "category": "general", "text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11723", "url": "https://www.suse.com/security/cve/CVE-2019-11723" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11723", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11723" }, { "cve": "CVE-2019-11724", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11724" } ], "notes": [ { "category": "general", "text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11724", "url": "https://www.suse.com/security/cve/CVE-2019-11724" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11724", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11724" }, { "cve": "CVE-2019-11725", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11725" } ], "notes": [ { "category": "general", "text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11725", "url": "https://www.suse.com/security/cve/CVE-2019-11725" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11725", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11725" }, { "cve": "CVE-2019-11727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11727" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11727", "url": "https://www.suse.com/security/cve/CVE-2019-11727" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1140868" }, { "category": "external", "summary": "SUSE Bug 1141322 for CVE-2019-11727", "url": "https://bugzilla.suse.com/1141322" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11727" }, { "cve": "CVE-2019-11728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11728" } ], "notes": [ { "category": "general", "text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11728", "url": "https://www.suse.com/security/cve/CVE-2019-11728" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11728", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11728" }, { "cve": "CVE-2019-11729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11729" } ], "notes": [ { "category": "general", "text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11729", "url": "https://www.suse.com/security/cve/CVE-2019-11729" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11729", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11729" }, { "cve": "CVE-2019-11730", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11730" } ], "notes": [ { "category": "general", "text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11730", "url": "https://www.suse.com/security/cve/CVE-2019-11730" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-11730", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11730" }, { "cve": "CVE-2019-11733", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11733" } ], "notes": [ { "category": "general", "text": "When a master password is set, it is required to be entered again before stored passwords can be accessed in the \u0027Saved Logins\u0027 dialog. It was found that locally stored passwords can be copied to the clipboard thorough the \u0027copy password\u0027 context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11733", "url": "https://www.suse.com/security/cve/CVE-2019-11733" }, { "category": "external", "summary": "SUSE Bug 1145665 for CVE-2019-11733", "url": "https://bugzilla.suse.com/1145665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11733" }, { "cve": "CVE-2019-11735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11735" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11735", "url": "https://www.suse.com/security/cve/CVE-2019-11735" }, { "category": "external", "summary": "SUSE Bug 1149293 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149293" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11735", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11735" }, { "cve": "CVE-2019-11736", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11736" } ], "notes": [ { "category": "general", "text": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. \u003cbr\u003e*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11736", "url": "https://www.suse.com/security/cve/CVE-2019-11736" }, { "category": "external", "summary": "SUSE Bug 1149292 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149292" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11736", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11736" }, { "cve": "CVE-2019-11738", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11738" } ], "notes": [ { "category": "general", "text": "If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11738", "url": "https://www.suse.com/security/cve/CVE-2019-11738" }, { "category": "external", "summary": "SUSE Bug 1149302 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149302" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11738", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11738" }, { "cve": "CVE-2019-11740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11740" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11740", "url": "https://www.suse.com/security/cve/CVE-2019-11740" }, { "category": "external", "summary": "SUSE Bug 1149299 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149299" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11740", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11740" }, { "cve": "CVE-2019-11742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11742" } ], "notes": [ { "category": "general", "text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11742", "url": "https://www.suse.com/security/cve/CVE-2019-11742" }, { "category": "external", "summary": "SUSE Bug 1149303 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149303" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11742", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11742" }, { "cve": "CVE-2019-11743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11743" } ], "notes": [ { "category": "general", "text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11743", "url": "https://www.suse.com/security/cve/CVE-2019-11743" }, { "category": "external", "summary": "SUSE Bug 1149298 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149298" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11743", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11743" }, { "cve": "CVE-2019-11744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11744" } ], "notes": [ { "category": "general", "text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11744", "url": "https://www.suse.com/security/cve/CVE-2019-11744" }, { "category": "external", "summary": "SUSE Bug 1149304 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149304" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11744", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11744" }, { "cve": "CVE-2019-11746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11746" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11746", "url": "https://www.suse.com/security/cve/CVE-2019-11746" }, { "category": "external", "summary": "SUSE Bug 1149297 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149297" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11746", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11746" }, { "cve": "CVE-2019-11747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11747" } ], "notes": [ { "category": "general", "text": "The \"Forget about this site\" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site\u0027s HSTS setting will be restored. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11747", "url": "https://www.suse.com/security/cve/CVE-2019-11747" }, { "category": "external", "summary": "SUSE Bug 1149301 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149301" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11747", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-11747" }, { "cve": "CVE-2019-11748", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11748" } ], "notes": [ { "category": "general", "text": "WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11748", "url": "https://www.suse.com/security/cve/CVE-2019-11748" }, { "category": "external", "summary": "SUSE Bug 1149291 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149291" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11748", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11748" }, { "cve": "CVE-2019-11749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11749" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11749", "url": "https://www.suse.com/security/cve/CVE-2019-11749" }, { "category": "external", "summary": "SUSE Bug 1149290 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149290" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11749", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11749" }, { "cve": "CVE-2019-11750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11750" } ], "notes": [ { "category": "general", "text": "A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11750", "url": "https://www.suse.com/security/cve/CVE-2019-11750" }, { "category": "external", "summary": "SUSE Bug 1149289 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149289" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11750", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-11750" }, { "cve": "CVE-2019-11751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11751" } ], "notes": [ { "category": "general", "text": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows \u0027Startup\u0027 folder. \u003cbr\u003e*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11751", "url": "https://www.suse.com/security/cve/CVE-2019-11751" }, { "category": "external", "summary": "SUSE Bug 1149286 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149286" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11751", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11751" }, { "cve": "CVE-2019-11752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11752" } ], "notes": [ { "category": "general", "text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11752", "url": "https://www.suse.com/security/cve/CVE-2019-11752" }, { "category": "external", "summary": "SUSE Bug 1149296 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149296" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1149324" }, { "category": "external", "summary": "SUSE Bug 1150940 for CVE-2019-11752", "url": "https://bugzilla.suse.com/1150940" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11752" }, { "cve": "CVE-2019-11753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11753" } ], "notes": [ { "category": "general", "text": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. \u003cbr\u003e*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11753", "url": "https://www.suse.com/security/cve/CVE-2019-11753" }, { "category": "external", "summary": "SUSE Bug 1149295 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149295" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-11753", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11753" }, { "cve": "CVE-2019-11757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11757" } ], "notes": [ { "category": "general", "text": "When following the value\u0027s prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11757", "url": "https://www.suse.com/security/cve/CVE-2019-11757" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11757", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11757" }, { "cve": "CVE-2019-11758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11758" } ], "notes": [ { "category": "general", "text": "Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11758", "url": "https://www.suse.com/security/cve/CVE-2019-11758" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11758", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11758" }, { "cve": "CVE-2019-11759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11759" } ], "notes": [ { "category": "general", "text": "An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11759", "url": "https://www.suse.com/security/cve/CVE-2019-11759" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11759", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11759" }, { "cve": "CVE-2019-11760", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11760" } ], "notes": [ { "category": "general", "text": "A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11760", "url": "https://www.suse.com/security/cve/CVE-2019-11760" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11760", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11760" }, { "cve": "CVE-2019-11761", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11761" } ], "notes": [ { "category": "general", "text": "By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11761", "url": "https://www.suse.com/security/cve/CVE-2019-11761" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11761", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11761" }, { "cve": "CVE-2019-11762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11762" } ], "notes": [ { "category": "general", "text": "If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11762", "url": "https://www.suse.com/security/cve/CVE-2019-11762" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11762", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11762" }, { "cve": "CVE-2019-11763", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11763" } ], "notes": [ { "category": "general", "text": "Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11763", "url": "https://www.suse.com/security/cve/CVE-2019-11763" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11763", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11763" }, { "cve": "CVE-2019-11764", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11764" } ], "notes": [ { "category": "general", "text": "Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 70, Thunderbird \u003c 68.2, and Firefox ESR \u003c 68.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11764", "url": "https://www.suse.com/security/cve/CVE-2019-11764" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-11764", "url": "https://bugzilla.suse.com/1154738" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-11764" }, { "cve": "CVE-2019-13173", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-13173" } ], "notes": [ { "category": "general", "text": "fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system\u0027s file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-13173", "url": "https://www.suse.com/security/cve/CVE-2019-13173" }, { "category": "external", "summary": "SUSE Bug 1140290 for CVE-2019-13173", "url": "https://bugzilla.suse.com/1140290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-13173" }, { "cve": "CVE-2019-15903", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15903" } ], "notes": [ { "category": "general", "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15903", "url": "https://www.suse.com/security/cve/CVE-2019-15903" }, { "category": "external", "summary": "SUSE Bug 1149429 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1149429" }, { "category": "external", "summary": "SUSE Bug 1154738 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154738" }, { "category": "external", "summary": "SUSE Bug 1154806 for CVE-2019-15903", "url": "https://bugzilla.suse.com/1154806" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-15903" }, { "cve": "CVE-2019-5010", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5010" } ], "notes": [ { "category": "general", "text": "An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5010", "url": "https://www.suse.com/security/cve/CVE-2019-5010" }, { "category": "external", "summary": "SUSE Bug 1122191 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1122191" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2019-5010", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-5010" }, { "cve": "CVE-2019-5737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-5737" } ], "notes": [ { "category": "general", "text": "In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-5737", "url": "https://www.suse.com/security/cve/CVE-2019-5737" }, { "category": "external", "summary": "SUSE Bug 1127532 for CVE-2019-5737", "url": "https://bugzilla.suse.com/1127532" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-5737" }, { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9518" }, { "cve": "CVE-2019-9636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9636" } ], "notes": [ { "category": "general", "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9636", "url": "https://www.suse.com/security/cve/CVE-2019-9636" }, { "category": "external", "summary": "SUSE Bug 1129346 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1129346" }, { "category": "external", "summary": "SUSE Bug 1135433 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1135433" }, { "category": "external", "summary": "SUSE Bug 1138459 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1138459" }, { "category": "external", "summary": "SUSE Bug 1145004 for CVE-2019-9636", "url": "https://bugzilla.suse.com/1145004" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9636" }, { "cve": "CVE-2019-9811", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9811" } ], "notes": [ { "category": "general", "text": "As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9811", "url": "https://www.suse.com/security/cve/CVE-2019-9811" }, { "category": "external", "summary": "SUSE Bug 1140868 for CVE-2019-9811", "url": "https://bugzilla.suse.com/1140868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9811" }, { "cve": "CVE-2019-9812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9812" } ], "notes": [ { "category": "general", "text": "Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9812", "url": "https://www.suse.com/security/cve/CVE-2019-9812" }, { "category": "external", "summary": "SUSE Bug 1149294 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149294" }, { "category": "external", "summary": "SUSE Bug 1149323 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149323" }, { "category": "external", "summary": "SUSE Bug 1149324 for CVE-2019-9812", "url": "https://bugzilla.suse.com/1149324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "important" } ], "title": "CVE-2019-9812" }, { "cve": "CVE-2019-9947", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9947" } ], "notes": [ { "category": "general", "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9947", "url": "https://www.suse.com/security/cve/CVE-2019-9947" }, { "category": "external", "summary": "SUSE Bug 1130840 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1130840" }, { "category": "external", "summary": "SUSE Bug 1136184 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1136184" }, { "category": "external", "summary": "SUSE Bug 1155094 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1155094" }, { "category": "external", "summary": "SUSE Bug 1201559 for CVE-2019-9947", "url": "https://bugzilla.suse.com/1201559" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-68-21.9.8.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-68.2.0-78.51.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-atk-lang-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-lang-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-query-loaders-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gdk-pixbuf-thumbnailer-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gio-branding-upstream-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-lang-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-glib2-tools-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-branding-upstream-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-data-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-amharic-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-inuktitut-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-multipress-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-thai-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-vietnamese-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodule-xim-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-immodules-tigrigna-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-lang-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-gtk3-tools-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libatk-1_0-0-2.26.1-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo-gobject2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libcairo2-1.15.10-2.13.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi4-5.3.1+r233831-14.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libffi7-3.2.1.git259-2.3.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgdk_pixbuf-2_0-0-2.36.11-2.8.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libgtk-3-0-3.10.9-2.15.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libharfbuzz0-1.7.5-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:firefox-libpango-1_0-0-1.40.14-2.7.4.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gio-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-glib-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gmodule-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gobject-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfirefox-gthread-2_0-0-2.54.3-2.14.7.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libfreebl3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:libsoftokn3-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-32bit-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nspr-devel-4.21-29.6.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-certs-32bit-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-devel-3.45-38.9.3.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:mozilla-nss-tools-3.45-38.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-01-17T17:07:38Z", "details": "moderate" } ], "title": "CVE-2019-9947" } ] }
suse-su-2019:2254-1
Vulnerability from csaf_suse
Published
2019-08-29 16:53
Modified
2019-08-29 16:53
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Patchnames
SUSE-2019-2254,SUSE-SLE-Module-Web-Scripting-12-2019-2254
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2254,SUSE-SLE-Module-Web-Scripting-12-2019-2254", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2254-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2254-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192254-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2254-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-08-29T16:53:45Z", "generator": { "date": "2019-08-29T16:53:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2254-1", "initial_release_date": "2019-08-29T16:53:45Z", "revision_history": [ { "date": "2019-08-29T16:53:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-10.16.3-1.12.1.s390", "product_id": "nodejs10-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390", "product": { "name": "npm10-10.16.3-1.12.1.s390", "product_id": "npm10-10.16.3-1.12.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 12", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 12:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 12:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-08-29T16:53:45Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2259-1
Vulnerability from csaf_suse
Published
2019-09-02 07:04
Modified
2019-09-02 07:04
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Patchnames
SUSE-2019-2259,SUSE-SLE-Module-Web-Scripting-15-2019-2259,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2259
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2259,SUSE-SLE-Module-Web-Scripting-15-2019-2259,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2259", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2259-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2259-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192259-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2259-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-02T07:04:04Z", "generator": { "date": "2019-09-02T07:04:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2259-1", "initial_release_date": "2019-09-02T07:04:04Z", "revision_history": [ { "date": "2019-09-02T07:04:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64", "product_id": "nodejs10-devel-10.16.3-1.12.1.aarch64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.aarch64", "product": { "name": "npm10-10.16.3-1.12.1.aarch64", "product_id": "npm10-10.16.3-1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-10.16.3-1.12.1.i586", "product_id": "nodejs10-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.i586", "product_id": "nodejs10-devel-10.16.3-1.12.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.i586", "product": { "name": "npm10-10.16.3-1.12.1.i586", "product_id": "npm10-10.16.3-1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch", "product_id": "nodejs10-docs-10.16.3-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "product_id": "nodejs10-devel-10.16.3-1.12.1.ppc64le" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.ppc64le", "product": { "name": "npm10-10.16.3-1.12.1.ppc64le", "product_id": "npm10-10.16.3-1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-10.16.3-1.12.1.s390x", "product_id": "nodejs10-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x", "product_id": "nodejs10-devel-10.16.3-1.12.1.s390x" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.s390x", "product": { "name": "npm10-10.16.3-1.12.1.s390x", "product_id": "npm10-10.16.3-1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64", "product_id": "nodejs10-devel-10.16.3-1.12.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-1.12.1.x86_64", "product": { "name": "npm10-10.16.3-1.12.1.x86_64", "product_id": "npm10-10.16.3-1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-1.12.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64" }, "product_reference": "npm10-10.16.3-1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le" }, "product_reference": "npm10-10.16.3-1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x" }, "product_reference": "npm10-10.16.3-1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-1.12.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64" }, "product_reference": "npm10-10.16.3-1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-devel-10.16.3-1.12.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs10-docs-10.16.3-1.12.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm10-10.16.3-1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:04Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
suse-su-2019:2260-1
Vulnerability from csaf_suse
Published
2019-09-02 07:04
Modified
2019-09-02 07:04
Summary
Security update for nodejs8
Notes
Title of the patch
Security update for nodejs8
Description of the patch
This update for nodejs8 to version 8.16.1 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Bug fixes:
- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).
Patchnames
SUSE-2019-2260,SUSE-SLE-Module-Web-Scripting-15-2019-2260,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2260
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2260,SUSE-SLE-Module-Web-Scripting-15-2019-2260,SUSE-SLE-Module-Web-Scripting-15-SP1-2019-2260", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2260-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2260-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192260-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2260-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-02T07:04:20Z", "generator": { "date": "2019-09-02T07:04:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2260-1", "initial_release_date": "2019-09-02T07:04:20Z", "revision_history": [ { "date": "2019-09-02T07:04:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64", "product_id": "nodejs8-devel-8.16.1-3.20.1.aarch64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.aarch64", "product": { "name": "npm8-8.16.1-3.20.1.aarch64", "product_id": "npm8-8.16.1-3.20.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-8.16.1-3.20.1.i586", "product_id": "nodejs8-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.i586", "product_id": "nodejs8-devel-8.16.1-3.20.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.i586", "product": { "name": "npm8-8.16.1-3.20.1.i586", "product_id": "npm8-8.16.1-3.20.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch", "product_id": "nodejs8-docs-8.16.1-3.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "product_id": "nodejs8-devel-8.16.1-3.20.1.ppc64le" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.ppc64le", "product": { "name": "npm8-8.16.1-3.20.1.ppc64le", "product_id": "npm8-8.16.1-3.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-8.16.1-3.20.1.s390x", "product_id": "nodejs8-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x", "product_id": "nodejs8-devel-8.16.1-3.20.1.s390x" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.s390x", "product": { "name": "npm8-8.16.1-3.20.1.s390x", "product_id": "npm8-8.16.1-3.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64", "product_id": "nodejs8-devel-8.16.1-3.20.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-3.20.1.x86_64", "product": { "name": "npm8-8.16.1-3.20.1.x86_64", "product_id": "npm8-8.16.1-3.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-3.20.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-3.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.aarch64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64" }, "product_reference": "npm8-8.16.1-3.20.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.ppc64le as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le" }, "product_reference": "npm8-8.16.1-3.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.s390x as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x" }, "product_reference": "npm8-8.16.1-3.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-3.20.1.x86_64 as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP1", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64" }, "product_reference": "npm8-8.16.1-3.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15 SP1:npm8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.16.1-3.20.1.x86_64", "SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.16.1-3.20.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.aarch64", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.ppc64le", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.s390x", "SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.16.1-3.20.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-02T07:04:20Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
fkie_cve-2019-9518
Vulnerability from fkie_nvd
Published
2019-08-13 21:15
Modified
2025-01-14 19:29
Severity ?
Summary
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html | Mailing List, Third Party Advisory | |
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html | Mailing List, Third Party Advisory | |
cret@cert.org | http://seclists.org/fulldisclosure/2019/Aug/16 | Mailing List, Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2925 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2939 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:2955 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:3892 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2019:4352 | Third Party Advisory | |
cret@cert.org | https://access.redhat.com/errata/RHSA-2020:0727 | Third Party Advisory | |
cret@cert.org | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md | Third Party Advisory | |
cret@cert.org | https://kb.cert.org/vuls/id/605641/ | Third Party Advisory, US Government Resource | |
cret@cert.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10296 | Third Party Advisory | |
cret@cert.org | https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E | ||
cret@cert.org | https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/ | ||
cret@cert.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/ | ||
cret@cert.org | https://seclists.org/bugtraq/2019/Aug/24 | Mailing List, Third Party Advisory | |
cret@cert.org | https://seclists.org/bugtraq/2019/Sep/18 | Mailing List, Third Party Advisory | |
cret@cert.org | https://security.netapp.com/advisory/ntap-20190823-0005/ | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K46011592 | Third Party Advisory | |
cret@cert.org | https://support.f5.com/csp/article/K46011592?utm_source=f5support&%3Butm_medium=RSS | ||
cret@cert.org | https://www.debian.org/security/2019/dsa-4520 | Third Party Advisory | |
cret@cert.org | https://www.synology.com/security/advisory/Synology_SA_19_33 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Aug/16 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2925 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2939 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2955 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3892 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:4352 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0727 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kb.cert.org/vuls/id/605641/ | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10296 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Aug/24 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Sep/18 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190823-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K46011592 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K46011592?utm_source=f5support&%3Butm_medium=RSS | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4520 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synology.com/security/advisory/Synology_SA_19_33 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apple | swiftnio | * | |
apple | mac_os_x | * | |
canonical | ubuntu_linux | * | |
apache | traffic_server | * | |
apache | traffic_server | * | |
apache | traffic_server | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 19.04 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
synology | skynas | - | |
synology | diskstation_manager | 6.2 | |
synology | vs960hd_firmware | - | |
synology | vs960hd | - | |
fedoraproject | fedora | 29 | |
fedoraproject | fedora | 30 | |
opensuse | leap | 15.0 | |
opensuse | leap | 15.1 | |
redhat | jboss_core_services | 1.0 | |
redhat | jboss_enterprise_application_platform | 7.2.0 | |
redhat | jboss_enterprise_application_platform | 7.3.0 | |
redhat | openshift_service_mesh | 1.0 | |
redhat | quay | 3.0.0 | |
redhat | software_collections | 1.0 | |
redhat | enterprise_linux | 8.0 | |
oracle | graalvm | 19.2.0 | |
mcafee | web_gateway | * | |
mcafee | web_gateway | * | |
mcafee | web_gateway | * | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * | |
nodejs | node.js | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "matchCriteriaId": "93988E60-006B-434D-AB16-1FA1D2FEBC2A", "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D294D56-E784-4DA8-9C2C-BC5A05C92C0C", "versionStartIncluding": "10.12", "vulnerable": false }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "65B1D2F6-BC1F-47AF-B4E6-4B50986AC622", "versionStartIncluding": "14.04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "603BF43B-FC99-4039-A3C0-467F015A32FA", "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "07BB02CE-D4F2-459C-B0C6-FF78BF7996AE", "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D875E0D8-D109-4F7F-A4C4-9EDD66CEE74E", "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88", "vulnerable": true }, { "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0C5120-B961-440F-B454-584BC54B549C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CCBDFF9-AF42-4681-879B-CF789EBAD130", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0952BA1A-5DF9-400F-B01F-C3A398A8A2D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B157A2D-3422-4224-82D9-15AB3B989075", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "732F14CE-7994-4DD2-A28B-AE9E79826C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1987BDA-0113-4603-B9BE-76647EB043F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C120C2F1-D50D-49CC-8E96-207ACCA49674", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "765E9856-2748-4A8B-91F5-A4DB3C8C547A", "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE6E66B1-3291-4E8E-93D6-30E9FDCF983E", "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "227104AD-396D-4ADD-87C7-C4CD5583DA04", "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "74FB695D-2C76-47AB-988E-5629D2E695E5", "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "CFC0252A-DF1D-4CF4-B450-27267227B599", "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "25A3180B-21AF-4010-9DAB-41ADFD2D8031", "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "matchCriteriaId": "2EC65858-FF7B-4171-82EA-80942D426F40", "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "matchCriteriaId": "F522C500-AA33-4029-865F-F27FB00A354E", "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU." }, { "lang": "es", "value": "Algunas implementaciones de HTTP / 2 son vulnerables a una avalancha de tramas vac\u00edas, lo que puede conducir a una denegaci\u00f3n de servicio. El atacante env\u00eda una secuencia de tramas con una carga \u00fatil vac\u00eda y sin el indicador de fin de secuencia. Estos marcos pueden ser DATA, HEADERS, CONTINUATION y / o PUSH_PROMISE. El par pasa tiempo procesando cada cuadro desproporcionado para atacar el ancho de banda. Esto puede consumir un exceso de CPU." } ], "id": "CVE-2019-9518", "lastModified": "2025-01-14T19:29:55.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "cret@cert.org", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-13T21:15:13.003", "references": [ { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "cret@cert.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "source": "cret@cert.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K46011592" }, { "source": "cret@cert.org", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K46011592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cret@cert.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2019:2115-1
Vulnerability from csaf_opensuse
Published
2019-09-10 16:22
Modified
2019-09-10 16:22
Summary
Security update for nodejs8
Notes
Title of the patch
Security update for nodejs8
Description of the patch
This update for nodejs8 to version 8.16.1 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Bug fixes:
- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2115
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs8", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs8 to version 8.16.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nBug fixes:\n\n- Fixed that npm resolves its default config file like in all other versions, as /etc/nodejs/npmrc (bsc#1144919).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2115", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2115-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2115-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" }, { "category": "self", "summary": "SUSE Bug 1144919", "url": "https://bugzilla.suse.com/1144919" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs8", "tracking": { "current_release_date": "2019-09-10T16:22:52Z", "generator": { "date": "2019-09-10T16:22:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2115-1", "initial_release_date": "2019-09-10T16:22:52Z", "revision_history": [ { "date": "2019-09-10T16:22:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.i586", "product": { "name": "npm8-8.16.1-lp151.2.6.1.i586", "product_id": "npm8-8.16.1-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "product_id": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "product_id": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64", "product_id": "npm8-8.16.1-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch" }, "product_reference": "nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm8-8.16.1-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" }, "product_reference": "npm8-8.16.1-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs8-devel-8.16.1-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs8-docs-8.16.1-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm8-8.16.1-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:52Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
opensuse-su-2019:2114-1
Vulnerability from csaf_opensuse
Published
2019-09-10 16:22
Modified
2019-09-10 16:22
Summary
Security update for nodejs10
Notes
Title of the patch
Security update for nodejs10
Description of the patch
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2114
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nodejs10", "title": "Title of the patch" }, { "category": "description", "text": "This update for nodejs10 to version 10.16.3 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).\n- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).\n- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).\n- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).\n- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).\n- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).\n- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).\n- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-2114", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2114-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:2114-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" }, { "category": "self", "summary": "SUSE Bug 1146090", "url": "https://bugzilla.suse.com/1146090" }, { "category": "self", "summary": "SUSE Bug 1146091", "url": "https://bugzilla.suse.com/1146091" }, { "category": "self", "summary": "SUSE Bug 1146093", "url": "https://bugzilla.suse.com/1146093" }, { "category": "self", "summary": "SUSE Bug 1146094", "url": "https://bugzilla.suse.com/1146094" }, { "category": "self", "summary": "SUSE Bug 1146095", "url": "https://bugzilla.suse.com/1146095" }, { "category": "self", "summary": "SUSE Bug 1146097", "url": "https://bugzilla.suse.com/1146097" }, { "category": "self", "summary": "SUSE Bug 1146099", "url": "https://bugzilla.suse.com/1146099" }, { "category": "self", "summary": "SUSE Bug 1146100", "url": "https://bugzilla.suse.com/1146100" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9511 page", "url": "https://www.suse.com/security/cve/CVE-2019-9511/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9513 page", "url": "https://www.suse.com/security/cve/CVE-2019-9513/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9514 page", "url": "https://www.suse.com/security/cve/CVE-2019-9514/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9515 page", "url": "https://www.suse.com/security/cve/CVE-2019-9515/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9516 page", "url": "https://www.suse.com/security/cve/CVE-2019-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9517 page", "url": "https://www.suse.com/security/cve/CVE-2019-9517/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9518 page", "url": "https://www.suse.com/security/cve/CVE-2019-9518/" } ], "title": "Security update for nodejs10", "tracking": { "current_release_date": "2019-09-10T16:22:24Z", "generator": { "date": "2019-09-10T16:22:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:2114-1", "initial_release_date": "2019-09-10T16:22:24Z", "revision_history": [ { "date": "2019-09-10T16:22:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.i586" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.i586", "product": { "name": "npm10-10.16.3-lp151.2.6.1.i586", "product_id": "npm10-10.16.3-lp151.2.6.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "product_id": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "product_id": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" } }, { "category": "product_version", "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64", "product_id": "npm10-10.16.3-lp151.2.6.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } }, { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch" }, "product_reference": "nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.i586 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.i586", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "npm10-10.16.3-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" }, "product_reference": "npm10-10.16.3-lp151.2.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-9511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9511" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9511", "url": "https://www.suse.com/security/cve/CVE-2019-9511" }, { "category": "external", "summary": "SUSE Bug 1145579 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1145579" }, { "category": "external", "summary": "SUSE Bug 1146091 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146091" }, { "category": "external", "summary": "SUSE Bug 1146182 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1146182" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9511", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9511" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9513" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9513", "url": "https://www.suse.com/security/cve/CVE-2019-9513" }, { "category": "external", "summary": "SUSE Bug 1145580 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1145580" }, { "category": "external", "summary": "SUSE Bug 1146094 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146094" }, { "category": "external", "summary": "SUSE Bug 1146184 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1146184" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1193427" }, { "category": "external", "summary": "SUSE Bug 1202787 for CVE-2019-9513", "url": "https://bugzilla.suse.com/1202787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9513" }, { "cve": "CVE-2019-9514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9514" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9514", "url": "https://www.suse.com/security/cve/CVE-2019-9514" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146095 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146095" }, { "category": "external", "summary": "SUSE Bug 1146115 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1146115" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9514", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9515" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9515", "url": "https://www.suse.com/security/cve/CVE-2019-9515" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146100 for CVE-2019-9515", "url": "https://bugzilla.suse.com/1146100" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9516" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9516", "url": "https://www.suse.com/security/cve/CVE-2019-9516" }, { "category": "external", "summary": "SUSE Bug 1145582 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1145582" }, { "category": "external", "summary": "SUSE Bug 1146090 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1146090" }, { "category": "external", "summary": "SUSE Bug 1193427 for CVE-2019-9516", "url": "https://bugzilla.suse.com/1193427" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "low" } ], "title": "CVE-2019-9516" }, { "cve": "CVE-2019-9517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9517" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9517", "url": "https://www.suse.com/security/cve/CVE-2019-9517" }, { "category": "external", "summary": "SUSE Bug 1145575 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1145575" }, { "category": "external", "summary": "SUSE Bug 1146097 for CVE-2019-9517", "url": "https://bugzilla.suse.com/1146097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "moderate" } ], "title": "CVE-2019-9517" }, { "cve": "CVE-2019-9518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9518" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9518", "url": "https://www.suse.com/security/cve/CVE-2019-9518" }, { "category": "external", "summary": "SUSE Bug 1145662 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145662" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146093 for CVE-2019-9518", "url": "https://bugzilla.suse.com/1146093" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.0:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.0:npm10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:nodejs10-devel-10.16.3-lp151.2.6.1.x86_64", "openSUSE Leap 15.1:nodejs10-docs-10.16.3-lp151.2.6.1.noarch", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.i586", "openSUSE Leap 15.1:npm10-10.16.3-lp151.2.6.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-10T16:22:24Z", "details": "important" } ], "title": "CVE-2019-9518" } ] }
gsd-2019-9518
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-9518", "description": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "id": "GSD-2019-9518", "references": [ "https://www.suse.com/security/cve/CVE-2019-9518.html", "https://www.debian.org/security/2019/dsa-4520", "https://access.redhat.com/errata/RHSA-2020:3197", "https://access.redhat.com/errata/RHSA-2020:3196", "https://access.redhat.com/errata/RHSA-2020:1445", "https://access.redhat.com/errata/RHSA-2020:0983", "https://access.redhat.com/errata/RHSA-2020:0922", "https://access.redhat.com/errata/RHSA-2020:0727", "https://access.redhat.com/errata/RHSA-2019:4352", "https://access.redhat.com/errata/RHSA-2019:3892", "https://access.redhat.com/errata/RHSA-2019:2955", "https://access.redhat.com/errata/RHSA-2019:2939", "https://access.redhat.com/errata/RHSA-2019:2925", "https://advisories.mageia.org/CVE-2019-9518.html", "https://linux.oracle.com/cve/CVE-2019-9518.html", "https://ubuntu.com/security/CVE-2019-9518" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-9518" ], "details": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "id": "GSD-2019-9518", "modified": "2023-12-13T01:23:47.354539Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "HTTP/2 Empty Frame Flooding", "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9518", "STATE": "PUBLIC", "TITLE": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Piotr Sikora of Google for reporting this vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K46011592", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K46011592" }, { "name": "[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4520", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc@%3Ccommits.cassandra.apache.org%3E" }, { "name": "[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75@%3Ccommits.cassandra.apache.org%3E" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.0", "versionStartIncluding": "1.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "14.04", "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionStartIncluding": "10.12", "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.1.6", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.3", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.7.2.24", "versionStartIncluding": "7.7.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.8.2.13", "versionStartIncluding": "7.8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.2.0", "versionStartIncluding": "8.1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "8.8.1", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.0", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "12.8.1", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "10.16.3", "versionStartIncluding": "10.13.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "8.16.1", "versionStartIncluding": "8.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2019-9518" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-770" } ] } ] }, "references": { "reference_data": [ { "name": "VU#605641", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://kb.cert.org/vuls/id/605641/" }, { "name": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "name": "20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "name": "20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Aug/16" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_19_33", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "name": "https://support.f5.com/csp/article/K46011592", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K46011592" }, { "name": "[trafficserver-users] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61@%3Cusers.trafficserver.apache.org%3E" }, { "name": "[trafficserver-announce] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d@%3Cannounce.trafficserver.apache.org%3E" }, { "name": "[trafficserver-dev] 20190820 ATS is vulnerable to a HTTP/2 attack with empty frames", "refsource": "MLIST", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20190823-0005/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190823-0005/" }, { "name": "FEDORA-2019-5a6a7bc12c", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/" }, { "name": "FEDORA-2019-6a2980de56", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/" }, { "name": "DSA-4520", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2019/dsa-4520" }, { "name": "20190910 [SECURITY] [DSA 4520-1] trafficserver security update", "refsource": "BUGTRAQ", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "name": "openSUSE-SU-2019:2114", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "name": "openSUSE-SU-2019:2115", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "name": "RHSA-2019:2925", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "name": "RHSA-2019:2939", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "name": "RHSA-2019:2955", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "name": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "name": "RHSA-2019:3892", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "name": "[druid-commits] 20191115 [GitHub] [incubator-druid] ccaominh opened a new pull request #8878: Address security vulnerabilities", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" }, { "name": "RHSA-2019:4352", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "name": "RHSA-2020:0727", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "name": "[cassandra-commits] 20210526 [jira] [Created] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc@%3Ccommits.cassandra.apache.org%3E" }, { "name": "[cassandra-commits] 20210526 [jira] [Updated] (CASSANDRA-16698) Security vulnerability CVE-2019-9518 for Netty", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75@%3Ccommits.cassandra.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-08-12T18:40Z", "publishedDate": "2019-08-13T21:15Z" } } }
ghsa-93p3-5r25-4p75
Vulnerability from github
Published
2022-05-24 16:53
Modified
2025-01-14 21:31
Severity ?
VLAI Severity ?
Details
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
{ "affected": [], "aliases": [ "CVE-2019-9518" ], "database_specific": { "cwe_ids": [ "CWE-400", "CWE-770" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-08-13T21:15:00Z", "severity": "HIGH" }, "details": "Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.", "id": "GHSA-93p3-5r25-4p75", "modified": "2025-01-14T21:31:41Z", "published": "2022-05-24T16:53:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9518" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc%40%3Ccommits.cassandra.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc@%3Ccommits.cassandra.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75%40%3Ccommits.cassandra.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75@%3Ccommits.cassandra.apache.org%3E" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Aug/24" }, { "type": "WEB", "url": "https://seclists.org/bugtraq/2019/Sep/18" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190823-0005" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K46011592" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K46011592?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://www.debian.org/security/2019/dsa-4520" }, { "type": "WEB", "url": "https://www.synology.com/security/advisory/Synology_SA_19_33" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2925" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2939" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2955" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3892" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:4352" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:0727" }, { "type": "WEB", "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md" }, { "type": "WEB", "url": "https://kb.cert.org/vuls/id/605641" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10296" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61%40%3Cusers.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61@%3Cusers.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d%40%3Cannounce.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d@%3Cannounce.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe%40%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107%40%3Cdev.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2019/Aug/16" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2022-0770
Vulnerability from csaf_certbund
Published
2020-04-23 22:00
Modified
2024-05-16 22:00
Summary
IBM DB2: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 ausnutzen, um seine Privilegien zu erhöhen oder einen Denial of Service zu verursachen
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM DB2 ist ein relationales Datenbanksystem (RDBS) von IBM.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM DB2 ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial of Service zu verursachen", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0770 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-0770.json" }, { "category": "self", "summary": "WID-SEC-2022-0770 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0770" }, { "category": "external", "summary": "IBM Security Bulletin 6198380 vom 2020-04-23", "url": "https://www.ibm.com/support/pages/node/6198380" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2603 vom 2020-06-17", "url": "https://access.redhat.com/errata/RHSA-2020:2603" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4807 vom 2020-11-04", "url": "https://access.redhat.com/errata/RHSA-2020:4807" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2021:3225 vom 2021-08-20", "url": "https://access.redhat.com/errata/RHSA-2021:3225" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-115 vom 2022-05-27", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-115/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 6605881 vom 2022-07-21", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-have-been-identified-in-ibm-db2-shipped-with-ibm-puredata-system-for-operational-analytics/" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-070 vom 2024-02-03", "url": "https://www.dell.com/support/kbdoc/000221770/dsa-2024-=" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-144 vom 2023-10-03", "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-144/index.html" }, { "category": "external", "summary": "IBM Security Bulletin 7153639 vom 2024-05-17", "url": "https://www.ibm.com/support/pages/node/7153639" } ], "source_lang": "en-US", "title": "IBM DB2: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-16T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:32:05.856+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0770", "initial_release_date": "2020-04-23T22:00:00.000+00:00", "revision_history": [ { "date": "2020-04-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2020-06-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-03T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2021-08-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-05-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } }, { "category": "product_version_range", "name": "\u003cAnalyzer 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cAnalyzer 10.9.3-00", "product_id": "T030196" } }, { "category": "product_version_range", "name": "\u003cViewpoint 10.9.3-00", "product": { "name": "Hitachi Ops Center \u003cViewpoint 10.9.3-00", "product_id": "T030197" } } ], "category": "product_name", "name": "Ops Center" } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.1", "product": { "name": "IBM DB2 11.1", "product_id": "342000", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.1" } } }, { "category": "product_version", "name": "11.5", "product": { "name": "IBM DB2 11.5", "product_id": "695419", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:11.5" } } } ], "category": "product_name", "name": "DB2" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0001", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2009-0001" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0114" }, { "cve": "CVE-2014-0193", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-0193" }, { "cve": "CVE-2014-3488", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2014-3488" }, { "cve": "CVE-2015-2156", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2015-2156" }, { "cve": "CVE-2016-2402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2016-2402" }, { "cve": "CVE-2017-12972", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12972" }, { "cve": "CVE-2017-12973", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12973" }, { "cve": "CVE-2017-12974", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-12974" }, { "cve": "CVE-2017-18640", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-18640" }, { "cve": "CVE-2017-3734", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-3734" }, { "cve": "CVE-2017-5637", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2017-5637" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-11771", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-11771" }, { "cve": "CVE-2018-8009", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8009" }, { "cve": "CVE-2018-8012", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2018-8012" }, { "cve": "CVE-2019-0201", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-0201" }, { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-10202", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-10202" }, { "cve": "CVE-2019-12402", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-12402" }, { "cve": "CVE-2019-16869", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-16869" }, { "cve": "CVE-2019-17195", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17195" }, { "cve": "CVE-2019-17571", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-17571" }, { "cve": "CVE-2019-9512", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9512" }, { "cve": "CVE-2019-9514", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9514" }, { "cve": "CVE-2019-9515", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9515" }, { "cve": "CVE-2019-9518", "notes": [ { "category": "description", "text": "In IBM DB2 existieren mehrere Schwachstellen in abh\u00e4ngigen Bibliotheken. Ein entfernter anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T014381", "342000", "67646", "695419", "T030196", "T017562", "T030197" ] }, "release_date": "2020-04-23T22:00:00.000+00:00", "title": "CVE-2019-9518" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…